From ad93c6913db454022135b40e37f76bb43e98db4f Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Sat, 28 Dec 2024 15:31:19 +0900 Subject: [PATCH] Auto Update 2024/12/28 06:31:19 --- 2018/CVE-2018-18500.json | 8 ++++---- 2018/CVE-2018-9468.json | 8 ++++---- 2018/CVE-2018-9493.json | 8 ++++---- 2018/CVE-2018-9546.json | 8 ++++---- 2019/CVE-2019-11932.json | 8 ++++---- 2020/CVE-2020-13151.json | 8 ++++---- 2020/CVE-2020-1472.json | 31 +++++++++++++++++++++++++++++++ 2021/CVE-2021-21972.json | 8 ++++---- 2021/CVE-2021-44228.json | 6 +++--- 2022/CVE-2022-22954.json | 8 ++++---- 2022/CVE-2022-22965.json | 4 ++-- 2022/CVE-2022-38694.json | 8 ++++---- 2023/CVE-2023-38829.json | 2 +- 2024/CVE-2024-10914.json | 4 ++-- 2024/CVE-2024-11281.json | 2 +- 2024/CVE-2024-21413.json | 4 ++-- 2024/CVE-2024-30088.json | 8 ++++---- 2024/CVE-2024-3094.json | 8 ++++---- 2024/CVE-2024-40725.json | 2 +- 2024/CVE-2024-4577.json | 2 +- 2024/CVE-2024-50379.json | 14 +++++++------- 2024/CVE-2024-52316.json | 2 +- 2024/CVE-2024-52317.json | 2 +- 2024/CVE-2024-52318.json | 2 +- 2024/CVE-2024-53677.json | 8 ++++---- 2024/CVE-2024-6387.json | 4 ++-- 2024/CVE-2024-7954.json | 31 +++++++++++++++++++++++++++++++ 2024/CVE-2024-9047.json | 10 +++++----- 2024/CVE-2024-9441.json | 2 +- 2024/CVE-2024-9933.json | 2 +- README.md | 2 ++ 31 files changed, 144 insertions(+), 80 deletions(-) diff --git a/2018/CVE-2018-18500.json b/2018/CVE-2018-18500.json index 5ca801a3dc..3e35e575e6 100644 --- a/2018/CVE-2018-18500.json +++ b/2018/CVE-2018-18500.json @@ -14,10 +14,10 @@ "description": "PoC for CVE-2018-18500 - Firefox Use-After-Free", "fork": false, "created_at": "2019-04-18T00:26:10Z", - "updated_at": "2024-10-15T16:33:12Z", + "updated_at": "2024-12-28T02:11:09Z", "pushed_at": "2019-04-18T20:32:46Z", - "stargazers_count": 58, - "watchers_count": 58, + "stargazers_count": 59, + "watchers_count": 59, "has_discussions": false, "forks_count": 17, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 17, - "watchers": 58, + "watchers": 59, "score": 0, "subscribers_count": 2 } diff --git a/2018/CVE-2018-9468.json b/2018/CVE-2018-9468.json index cd24c4796a..7f00dc4261 100644 --- a/2018/CVE-2018-9468.json +++ b/2018/CVE-2018-9468.json @@ -14,10 +14,10 @@ "description": "PoC Exploiting Permission Bypass in Android's Download Provider (CVE-2018-9468)", "fork": false, "created_at": "2019-03-02T18:31:11Z", - "updated_at": "2024-09-25T13:33:26Z", + "updated_at": "2024-12-28T01:47:05Z", "pushed_at": "2020-01-15T12:34:10Z", - "stargazers_count": 19, - "watchers_count": 19, + "stargazers_count": 20, + "watchers_count": 20, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 19, + "watchers": 20, "score": 0, "subscribers_count": 4 } diff --git a/2018/CVE-2018-9493.json b/2018/CVE-2018-9493.json index e4afffa12d..d3d6e19d47 100644 --- a/2018/CVE-2018-9493.json +++ b/2018/CVE-2018-9493.json @@ -14,10 +14,10 @@ "description": "PoC Exploiting SQL Injection in Android's Download Provider (CVE-2018-9493)", "fork": false, "created_at": "2019-03-02T18:32:55Z", - "updated_at": "2024-08-12T19:46:17Z", + "updated_at": "2024-12-28T01:47:03Z", "pushed_at": "2020-01-15T12:33:07Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 7, + "watchers": 8, "score": 0, "subscribers_count": 4 } diff --git a/2018/CVE-2018-9546.json b/2018/CVE-2018-9546.json index 49e0070158..92695277ce 100644 --- a/2018/CVE-2018-9546.json +++ b/2018/CVE-2018-9546.json @@ -14,10 +14,10 @@ "description": "PoC Exploiting Headers Disclosure in Android's Download Provider (CVE-2018-9546)", "fork": false, "created_at": "2019-03-02T18:32:17Z", - "updated_at": "2024-08-12T19:46:17Z", + "updated_at": "2024-12-28T01:47:06Z", "pushed_at": "2020-01-15T12:33:46Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 6, + "watchers": 7, "score": 0, "subscribers_count": 4 } diff --git a/2019/CVE-2019-11932.json b/2019/CVE-2019-11932.json index 001ceac80d..d718832378 100644 --- a/2019/CVE-2019-11932.json +++ b/2019/CVE-2019-11932.json @@ -206,10 +206,10 @@ "description": "Programa para hackear Whatsapp Mediante Gif ,asiendo un exploit con el puerto.", "fork": false, "created_at": "2019-10-16T20:13:23Z", - "updated_at": "2024-12-19T04:52:25Z", + "updated_at": "2024-12-28T01:04:41Z", "pushed_at": "2021-06-16T16:49:33Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 13, + "watchers_count": 13, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -218,7 +218,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 12, + "watchers": 13, "score": 0, "subscribers_count": 5 }, diff --git a/2020/CVE-2020-13151.json b/2020/CVE-2020-13151.json index 01ec703021..60944ae23d 100644 --- a/2020/CVE-2020-13151.json +++ b/2020/CVE-2020-13151.json @@ -14,10 +14,10 @@ "description": "POC for CVE-2020-13151", "fork": false, "created_at": "2020-08-01T14:29:59Z", - "updated_at": "2024-11-23T20:27:06Z", + "updated_at": "2024-12-28T04:04:39Z", "pushed_at": "2020-08-03T18:55:37Z", - "stargazers_count": 28, - "watchers_count": 28, + "stargazers_count": 29, + "watchers_count": 29, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 5, - "watchers": 28, + "watchers": 29, "score": 0, "subscribers_count": 1 } diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index 5e6f49b362..68198dfd3e 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -2068,5 +2068,36 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 909197043, + "name": "ZerologonWithImpacket-CVE2020-1472", + "full_name": "TuanCui22\/ZerologonWithImpacket-CVE2020-1472", + "owner": { + "login": "TuanCui22", + "id": 124656776, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/124656776?v=4", + "html_url": "https:\/\/github.com\/TuanCui22", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/TuanCui22\/ZerologonWithImpacket-CVE2020-1472", + "description": "This project combines the Zerologon vulnerability exploit (CVE-2020-1472) with Impacket tools for streamlined exploitation and post-exploitation activities. It allows penetration testers to assess and demonstrate the impact of this critical vulnerability in a controlled and authorized environment.", + "fork": false, + "created_at": "2024-12-28T01:58:26Z", + "updated_at": "2024-12-28T02:43:41Z", + "pushed_at": "2024-12-28T02:43:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index e9ff103368..82ab92e91c 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -848,10 +848,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2024-12-27T09:08:06Z", + "updated_at": "2024-12-28T01:54:56Z", "pushed_at": "2024-04-25T06:09:38Z", - "stargazers_count": 1358, - "watchers_count": 1358, + "stargazers_count": 1359, + "watchers_count": 1359, "has_discussions": false, "forks_count": 167, "allow_forking": true, @@ -867,7 +867,7 @@ ], "visibility": "public", "forks": 167, - "watchers": 1358, + "watchers": 1359, "score": 0, "subscribers_count": 15 } diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 52664c2ba4..a737b80960 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -386,7 +386,7 @@ "stargazers_count": 1110, "watchers_count": 1110, "has_discussions": false, - "forks_count": 536, + "forks_count": 535, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -394,7 +394,7 @@ "log4shell" ], "visibility": "public", - "forks": 536, + "forks": 535, "watchers": 1110, "score": 0, "subscribers_count": 23 @@ -1574,7 +1574,7 @@ "fork": false, "created_at": "2021-12-11T12:16:45Z", "updated_at": "2024-04-29T17:48:37Z", - "pushed_at": "2024-12-26T19:27:05Z", + "pushed_at": "2024-12-28T04:32:25Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json index 4b0027a0af..211469552d 100644 --- a/2022/CVE-2022-22954.json +++ b/2022/CVE-2022-22954.json @@ -792,10 +792,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2024-12-27T09:08:06Z", + "updated_at": "2024-12-28T01:54:56Z", "pushed_at": "2024-04-25T06:09:38Z", - "stargazers_count": 1358, - "watchers_count": 1358, + "stargazers_count": 1359, + "watchers_count": 1359, "has_discussions": false, "forks_count": 167, "allow_forking": true, @@ -811,7 +811,7 @@ ], "visibility": "public", "forks": 167, - "watchers": 1358, + "watchers": 1359, "score": 0, "subscribers_count": 15 } diff --git a/2022/CVE-2022-22965.json b/2022/CVE-2022-22965.json index 4263f159e9..6266878456 100644 --- a/2022/CVE-2022-22965.json +++ b/2022/CVE-2022-22965.json @@ -19,7 +19,7 @@ "stargazers_count": 362, "watchers_count": 362, "has_discussions": false, - "forks_count": 106, + "forks_count": 105, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -34,7 +34,7 @@ "tomcat" ], "visibility": "public", - "forks": 106, + "forks": 105, "watchers": 362, "score": 0, "subscribers_count": 18 diff --git a/2022/CVE-2022-38694.json b/2022/CVE-2022-38694.json index 9449c4fd9f..e07f5aab1f 100644 --- a/2022/CVE-2022-38694.json +++ b/2022/CVE-2022-38694.json @@ -14,10 +14,10 @@ "description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692", "fork": false, "created_at": "2023-06-10T08:31:26Z", - "updated_at": "2024-12-24T08:04:15Z", + "updated_at": "2024-12-28T04:24:02Z", "pushed_at": "2024-08-01T15:09:15Z", - "stargazers_count": 311, - "watchers_count": 311, + "stargazers_count": 312, + "watchers_count": 312, "has_discussions": true, "forks_count": 46, "allow_forking": true, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 46, - "watchers": 311, + "watchers": 312, "score": 0, "subscribers_count": 8 }, diff --git a/2023/CVE-2023-38829.json b/2023/CVE-2023-38829.json index a86daa25ec..7412913061 100644 --- a/2023/CVE-2023-38829.json +++ b/2023/CVE-2023-38829.json @@ -59,6 +59,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-10914.json b/2024/CVE-2024-10914.json index 626f02d1b9..60e0b252f5 100644 --- a/2024/CVE-2024-10914.json +++ b/2024/CVE-2024-10914.json @@ -146,8 +146,8 @@ "description": "CVE-2024-10914 is a critical command injection vulnerability affecting several legacy D-Link Network Attached Storage (NAS) devices.", "fork": false, "created_at": "2024-11-16T16:32:05Z", - "updated_at": "2024-12-27T15:54:38Z", - "pushed_at": "2024-12-27T15:54:34Z", + "updated_at": "2024-12-28T06:13:38Z", + "pushed_at": "2024-12-28T05:50:13Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, diff --git a/2024/CVE-2024-11281.json b/2024/CVE-2024-11281.json index a24d0c2ddc..9297ea4c58 100644 --- a/2024/CVE-2024-11281.json +++ b/2024/CVE-2024-11281.json @@ -28,6 +28,6 @@ "forks": 0, "watchers": 2, "score": 0, - "subscribers_count": 1 + "subscribers_count": 2 } ] \ No newline at end of file diff --git a/2024/CVE-2024-21413.json b/2024/CVE-2024-21413.json index 8eff204d94..d717fc4846 100644 --- a/2024/CVE-2024-21413.json +++ b/2024/CVE-2024-21413.json @@ -112,13 +112,13 @@ "stargazers_count": 55, "watchers_count": 55, "has_discussions": false, - "forks_count": 12, + "forks_count": 13, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 12, + "forks": 13, "watchers": 55, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-30088.json b/2024/CVE-2024-30088.json index 8d78b51b9f..94e98d9498 100644 --- a/2024/CVE-2024-30088.json +++ b/2024/CVE-2024-30088.json @@ -107,10 +107,10 @@ "description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088", "fork": false, "created_at": "2024-07-15T08:07:05Z", - "updated_at": "2024-12-26T09:48:29Z", + "updated_at": "2024-12-28T03:53:59Z", "pushed_at": "2024-09-08T21:23:34Z", - "stargazers_count": 431, - "watchers_count": 431, + "stargazers_count": 432, + "watchers_count": 432, "has_discussions": false, "forks_count": 31, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 31, - "watchers": 431, + "watchers": 432, "score": 0, "subscribers_count": 21 }, diff --git a/2024/CVE-2024-3094.json b/2024/CVE-2024-3094.json index 88c377f14f..cbd7c9d87f 100644 --- a/2024/CVE-2024-3094.json +++ b/2024/CVE-2024-3094.json @@ -952,10 +952,10 @@ "description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)", "fork": false, "created_at": "2024-04-01T14:28:09Z", - "updated_at": "2024-12-28T00:23:22Z", + "updated_at": "2024-12-28T03:44:43Z", "pushed_at": "2024-04-03T04:58:50Z", - "stargazers_count": 3502, - "watchers_count": 3502, + "stargazers_count": 3503, + "watchers_count": 3503, "has_discussions": false, "forks_count": 240, "allow_forking": true, @@ -964,7 +964,7 @@ "topics": [], "visibility": "public", "forks": 240, - "watchers": 3502, + "watchers": 3503, "score": 0, "subscribers_count": 38 }, diff --git a/2024/CVE-2024-40725.json b/2024/CVE-2024-40725.json index 99db71fc94..1521d4478e 100644 --- a/2024/CVE-2024-40725.json +++ b/2024/CVE-2024-40725.json @@ -14,7 +14,7 @@ "description": "CVE-2024-40725 and CVE-2024-40898, affecting Apache HTTP Server versions 2.4.0 through 2.4.61. These flaws pose significant risks to web servers worldwide, potentially leading to source code disclosure and server-side request forgery (SSRF) attacks.", "fork": false, "created_at": "2024-07-19T03:51:54Z", - "updated_at": "2024-12-22T19:42:49Z", + "updated_at": "2024-12-28T05:47:37Z", "pushed_at": "2024-07-19T04:01:13Z", "stargazers_count": 68, "watchers_count": 68, diff --git a/2024/CVE-2024-4577.json b/2024/CVE-2024-4577.json index 8322fafd6e..b7b2c0a1e8 100644 --- a/2024/CVE-2024-4577.json +++ b/2024/CVE-2024-4577.json @@ -14,7 +14,7 @@ "description": "CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers to execute arbitrary commands via crafted URL parameters.", "fork": false, "created_at": "2024-06-07T05:50:23Z", - "updated_at": "2024-12-17T11:23:46Z", + "updated_at": "2024-12-28T05:47:39Z", "pushed_at": "2024-06-11T04:46:42Z", "stargazers_count": 78, "watchers_count": 78, diff --git a/2024/CVE-2024-50379.json b/2024/CVE-2024-50379.json index 2cc6f6cb61..c3f649dd61 100644 --- a/2024/CVE-2024-50379.json +++ b/2024/CVE-2024-50379.json @@ -262,19 +262,19 @@ "description": "CVE-2024-50379-exp", "fork": false, "created_at": "2024-12-25T02:41:31Z", - "updated_at": "2024-12-27T19:59:23Z", + "updated_at": "2024-12-28T06:28:45Z", "pushed_at": "2024-12-26T08:52:15Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, - "watchers": 1, + "forks": 1, + "watchers": 3, "score": 0, "subscribers_count": 1 }, @@ -307,7 +307,7 @@ "forks": 0, "watchers": 1, "score": 0, - "subscribers_count": 1 + "subscribers_count": 2 }, { "id": 908364457, diff --git a/2024/CVE-2024-52316.json b/2024/CVE-2024-52316.json index 860543bf3e..598be2931f 100644 --- a/2024/CVE-2024-52316.json +++ b/2024/CVE-2024-52316.json @@ -14,7 +14,7 @@ "description": "CVE-2024-52316 - Apache Tomcat Authentication Bypass Vulnerability", "fork": false, "created_at": "2024-11-20T10:22:50Z", - "updated_at": "2024-11-20T10:40:23Z", + "updated_at": "2024-12-28T05:47:37Z", "pushed_at": "2024-11-20T10:40:20Z", "stargazers_count": 0, "watchers_count": 0, diff --git a/2024/CVE-2024-52317.json b/2024/CVE-2024-52317.json index c520a1ac53..dbcf8bb40d 100644 --- a/2024/CVE-2024-52317.json +++ b/2024/CVE-2024-52317.json @@ -14,7 +14,7 @@ "description": "CVE-2024-52317 - Apache Tomcat HTTP\/2 Data Leakage Vulnerability", "fork": false, "created_at": "2024-11-21T06:20:42Z", - "updated_at": "2024-12-11T03:48:06Z", + "updated_at": "2024-12-28T05:47:34Z", "pushed_at": "2024-11-21T06:33:37Z", "stargazers_count": 2, "watchers_count": 2, diff --git a/2024/CVE-2024-52318.json b/2024/CVE-2024-52318.json index dd9a470c3d..01f4efe599 100644 --- a/2024/CVE-2024-52318.json +++ b/2024/CVE-2024-52318.json @@ -14,7 +14,7 @@ "description": "CVE-2024-52318 - Apache Tomcat XSS Vulnerability in Generated JSPs", "fork": false, "created_at": "2024-11-21T06:38:48Z", - "updated_at": "2024-11-21T06:44:43Z", + "updated_at": "2024-12-28T05:47:34Z", "pushed_at": "2024-11-21T06:44:39Z", "stargazers_count": 0, "watchers_count": 0, diff --git a/2024/CVE-2024-53677.json b/2024/CVE-2024-53677.json index 2b753981f8..bebfc982c6 100644 --- a/2024/CVE-2024-53677.json +++ b/2024/CVE-2024-53677.json @@ -45,10 +45,10 @@ "description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.", "fork": false, "created_at": "2024-12-13T17:42:55Z", - "updated_at": "2024-12-27T06:18:13Z", + "updated_at": "2024-12-28T05:47:35Z", "pushed_at": "2024-12-20T10:05:15Z", - "stargazers_count": 74, - "watchers_count": 74, + "stargazers_count": 76, + "watchers_count": 76, "has_discussions": false, "forks_count": 29, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 29, - "watchers": 74, + "watchers": 76, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-6387.json b/2024/CVE-2024-6387.json index a008aec6ee..e30b7e362b 100644 --- a/2024/CVE-2024-6387.json +++ b/2024/CVE-2024-6387.json @@ -467,7 +467,7 @@ "description": "Recently, the OpenSSH maintainers released security updates to fix a critical vulnerability that could lead to unauthenticated remote code execution (RCE) with root privileges. This vulnerability, identified as CVE-2024-6387, resides in the OpenSSH server component (sshd), which is designed to listen for connections from client applications.", "fork": false, "created_at": "2024-07-02T02:51:37Z", - "updated_at": "2024-12-17T13:08:21Z", + "updated_at": "2024-12-28T05:47:38Z", "pushed_at": "2024-07-02T03:23:00Z", "stargazers_count": 10, "watchers_count": 10, @@ -2180,7 +2180,7 @@ "description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)", "fork": false, "created_at": "2024-07-08T11:27:49Z", - "updated_at": "2024-12-27T20:08:20Z", + "updated_at": "2024-12-28T04:01:22Z", "pushed_at": "2024-08-22T08:50:25Z", "stargazers_count": 61, "watchers_count": 61, diff --git a/2024/CVE-2024-7954.json b/2024/CVE-2024-7954.json index 2a8bf508b9..ef1225d471 100644 --- a/2024/CVE-2024-7954.json +++ b/2024/CVE-2024-7954.json @@ -215,5 +215,36 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 909188493, + "name": "RCE_CVE-2024-7954-", + "full_name": "0dayan0n\/RCE_CVE-2024-7954-", + "owner": { + "login": "0dayan0n", + "id": 170557167, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/170557167?v=4", + "html_url": "https:\/\/github.com\/0dayan0n", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/0dayan0n\/RCE_CVE-2024-7954-", + "description": "The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request. (CRITICAL)", + "fork": false, + "created_at": "2024-12-28T01:05:05Z", + "updated_at": "2024-12-28T01:20:15Z", + "pushed_at": "2024-12-28T01:20:12Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-9047.json b/2024/CVE-2024-9047.json index 3500fb1621..ea38017b93 100644 --- a/2024/CVE-2024-9047.json +++ b/2024/CVE-2024-9047.json @@ -14,10 +14,10 @@ "description": "WordPress File Upload插件任意文件读取漏洞(CVE-2024-9047)批量检测脚本", "fork": false, "created_at": "2024-12-25T05:19:17Z", - "updated_at": "2024-12-27T06:36:48Z", + "updated_at": "2024-12-28T01:11:14Z", "pushed_at": "2024-12-25T05:28:55Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,8 +26,8 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0, - "subscribers_count": 1 + "subscribers_count": 2 } ] \ No newline at end of file diff --git a/2024/CVE-2024-9441.json b/2024/CVE-2024-9441.json index 77bfa666c2..7f31d45fe5 100644 --- a/2024/CVE-2024-9441.json +++ b/2024/CVE-2024-9441.json @@ -14,7 +14,7 @@ "description": "Nortek Linear eMerge E3 Pre-Auth RCE PoC (CVE-2024-9441)", "fork": false, "created_at": "2024-10-03T11:28:46Z", - "updated_at": "2024-10-16T04:34:58Z", + "updated_at": "2024-12-28T06:13:35Z", "pushed_at": "2024-10-03T11:32:27Z", "stargazers_count": 1, "watchers_count": 1, diff --git a/2024/CVE-2024-9933.json b/2024/CVE-2024-9933.json index b3d9824f8f..4436730fc1 100644 --- a/2024/CVE-2024-9933.json +++ b/2024/CVE-2024-9933.json @@ -59,6 +59,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/README.md b/README.md index 09c57a04eb..d018b88373 100644 --- a/README.md +++ b/README.md @@ -1656,6 +1656,7 @@ - [MuhammadWaseem29/RCE-CVE-2024-7954](https://github.com/MuhammadWaseem29/RCE-CVE-2024-7954) - [issamjr/CVE-2024-7954](https://github.com/issamjr/CVE-2024-7954) - [zxj-hub/CVE-2024-7954POC](https://github.com/zxj-hub/CVE-2024-7954POC) +- [0dayan0n/RCE_CVE-2024-7954-](https://github.com/0dayan0n/RCE_CVE-2024-7954-) ### CVE-2024-7965 (2024-08-21) @@ -30659,6 +30660,7 @@ - [whoami-chmod777/Zerologon-Attack-CVE-2020-1472-POC](https://github.com/whoami-chmod777/Zerologon-Attack-CVE-2020-1472-POC) - [JolynNgSC/Zerologon_CVE-2020-1472](https://github.com/JolynNgSC/Zerologon_CVE-2020-1472) - [blackh00d/zerologon-poc](https://github.com/blackh00d/zerologon-poc) +- [TuanCui22/ZerologonWithImpacket-CVE2020-1472](https://github.com/TuanCui22/ZerologonWithImpacket-CVE2020-1472) ### CVE-2020-1493 (2020-08-17)