diff --git a/2004/CVE-2004-2687.json b/2004/CVE-2004-2687.json index 65560964b1..a3df7de335 100644 --- a/2004/CVE-2004-2687.json +++ b/2004/CVE-2004-2687.json @@ -2,14 +2,14 @@ { "id": 382165102, "name": "distccd_rce_CVE-2004-2687", - "full_name": "N3rdyN3xus\/distccd_rce_CVE-2004-2687", + "full_name": "NyxByt3\/distccd_rce_CVE-2004-2687", "owner": { - "login": "N3rdyN3xus", + "login": "NyxByt3", "id": 66146701, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4", - "html_url": "https:\/\/github.com\/N3rdyN3xus" + "html_url": "https:\/\/github.com\/NyxByt3" }, - "html_url": "https:\/\/github.com\/N3rdyN3xus\/distccd_rce_CVE-2004-2687", + "html_url": "https:\/\/github.com\/NyxByt3\/distccd_rce_CVE-2004-2687", "description": null, "fork": false, "created_at": "2021-07-01T21:56:34Z", diff --git a/2007/CVE-2007-2447.json b/2007/CVE-2007-2447.json index 282245df78..51fee27ac8 100644 --- a/2007/CVE-2007-2447.json +++ b/2007/CVE-2007-2447.json @@ -692,14 +692,14 @@ { "id": 557398595, "name": "CVE-2007-2447", - "full_name": "N3rdyN3xus\/CVE-2007-2447", + "full_name": "NyxByt3\/CVE-2007-2447", "owner": { - "login": "N3rdyN3xus", + "login": "NyxByt3", "id": 66146701, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4", - "html_url": "https:\/\/github.com\/N3rdyN3xus" + "html_url": "https:\/\/github.com\/NyxByt3" }, - "html_url": "https:\/\/github.com\/N3rdyN3xus\/CVE-2007-2447", + "html_url": "https:\/\/github.com\/NyxByt3\/CVE-2007-2447", "description": "Exploit Samba smbd 3.0.20-Debian", "fork": false, "created_at": "2022-10-25T16:05:16Z", diff --git a/2009/CVE-2009-2265.json b/2009/CVE-2009-2265.json index 89e4d98a74..7743c537a1 100644 --- a/2009/CVE-2009-2265.json +++ b/2009/CVE-2009-2265.json @@ -32,14 +32,14 @@ { "id": 386447803, "name": "CVE-2009-2265", - "full_name": "N3rdyN3xus\/CVE-2009-2265", + "full_name": "NyxByt3\/CVE-2009-2265", "owner": { - "login": "N3rdyN3xus", + "login": "NyxByt3", "id": 66146701, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4", - "html_url": "https:\/\/github.com\/N3rdyN3xus" + "html_url": "https:\/\/github.com\/NyxByt3" }, - "html_url": "https:\/\/github.com\/N3rdyN3xus\/CVE-2009-2265", + "html_url": "https:\/\/github.com\/NyxByt3\/CVE-2009-2265", "description": null, "fork": false, "created_at": "2021-07-15T23:14:11Z", diff --git a/2011/CVE-2011-1249.json b/2011/CVE-2011-1249.json index 61ca354e45..bb7dba7cbc 100644 --- a/2011/CVE-2011-1249.json +++ b/2011/CVE-2011-1249.json @@ -32,14 +32,14 @@ { "id": 384774726, "name": "CVE-2011-1249", - "full_name": "N3rdyN3xus\/CVE-2011-1249", + "full_name": "NyxByt3\/CVE-2011-1249", "owner": { - "login": "N3rdyN3xus", + "login": "NyxByt3", "id": 66146701, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4", - "html_url": "https:\/\/github.com\/N3rdyN3xus" + "html_url": "https:\/\/github.com\/NyxByt3" }, - "html_url": "https:\/\/github.com\/N3rdyN3xus\/CVE-2011-1249", + "html_url": "https:\/\/github.com\/NyxByt3\/CVE-2011-1249", "description": null, "fork": false, "created_at": "2021-07-10T19:27:23Z", diff --git a/2014/CVE-2014-0160.json b/2014/CVE-2014-0160.json index 228b357f85..7779479055 100644 --- a/2014/CVE-2014-0160.json +++ b/2014/CVE-2014-0160.json @@ -1728,14 +1728,14 @@ { "id": 485013657, "name": "CVE-2014-0160_Heartbleed", - "full_name": "N3rdyN3xus\/CVE-2014-0160_Heartbleed", + "full_name": "NyxByt3\/CVE-2014-0160_Heartbleed", "owner": { - "login": "N3rdyN3xus", + "login": "NyxByt3", "id": 66146701, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4", - "html_url": "https:\/\/github.com\/N3rdyN3xus" + "html_url": "https:\/\/github.com\/NyxByt3" }, - "html_url": "https:\/\/github.com\/N3rdyN3xus\/CVE-2014-0160_Heartbleed", + "html_url": "https:\/\/github.com\/NyxByt3\/CVE-2014-0160_Heartbleed", "description": null, "fork": false, "created_at": "2022-04-24T11:53:16Z", diff --git a/2015/CVE-2015-1635.json b/2015/CVE-2015-1635.json index bfd2c1337c..7f958852d8 100644 --- a/2015/CVE-2015-1635.json +++ b/2015/CVE-2015-1635.json @@ -244,14 +244,14 @@ { "id": 385080605, "name": "CVE-2015-1635-POC", - "full_name": "N3rdyN3xus\/CVE-2015-1635-POC", + "full_name": "NyxByt3\/CVE-2015-1635-POC", "owner": { - "login": "N3rdyN3xus", + "login": "NyxByt3", "id": 66146701, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4", - "html_url": "https:\/\/github.com\/N3rdyN3xus" + "html_url": "https:\/\/github.com\/NyxByt3" }, - "html_url": "https:\/\/github.com\/N3rdyN3xus\/CVE-2015-1635-POC", + "html_url": "https:\/\/github.com\/NyxByt3\/CVE-2015-1635-POC", "description": null, "fork": false, "created_at": "2021-07-12T00:23:30Z", @@ -274,14 +274,14 @@ { "id": 385082908, "name": "CVE-2015-1635", - "full_name": "N3rdyN3xus\/CVE-2015-1635", + "full_name": "NyxByt3\/CVE-2015-1635", "owner": { - "login": "N3rdyN3xus", + "login": "NyxByt3", "id": 66146701, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4", - "html_url": "https:\/\/github.com\/N3rdyN3xus" + "html_url": "https:\/\/github.com\/NyxByt3" }, - "html_url": "https:\/\/github.com\/N3rdyN3xus\/CVE-2015-1635", + "html_url": "https:\/\/github.com\/NyxByt3\/CVE-2015-1635", "description": null, "fork": false, "created_at": "2021-07-12T00:37:54Z", diff --git a/2015/CVE-2015-6668.json b/2015/CVE-2015-6668.json index 36750a3bb7..de5740a53f 100644 --- a/2015/CVE-2015-6668.json +++ b/2015/CVE-2015-6668.json @@ -32,14 +32,14 @@ { "id": 386433999, "name": "CVE-2015-6668", - "full_name": "N3rdyN3xus\/CVE-2015-6668", + "full_name": "NyxByt3\/CVE-2015-6668", "owner": { - "login": "N3rdyN3xus", + "login": "NyxByt3", "id": 66146701, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4", - "html_url": "https:\/\/github.com\/N3rdyN3xus" + "html_url": "https:\/\/github.com\/NyxByt3" }, - "html_url": "https:\/\/github.com\/N3rdyN3xus\/CVE-2015-6668", + "html_url": "https:\/\/github.com\/NyxByt3\/CVE-2015-6668", "description": null, "fork": false, "created_at": "2021-07-15T21:58:15Z", diff --git a/2016/CVE-2016-1531.json b/2016/CVE-2016-1531.json index 55db9c5e82..5b55c11e4f 100644 --- a/2016/CVE-2016-1531.json +++ b/2016/CVE-2016-1531.json @@ -2,14 +2,14 @@ { "id": 615366361, "name": "CVE-2016-1531", - "full_name": "N3rdyN3xus\/CVE-2016-1531", + "full_name": "NyxByt3\/CVE-2016-1531", "owner": { - "login": "N3rdyN3xus", + "login": "NyxByt3", "id": 66146701, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4", - "html_url": "https:\/\/github.com\/N3rdyN3xus" + "html_url": "https:\/\/github.com\/NyxByt3" }, - "html_url": "https:\/\/github.com\/N3rdyN3xus\/CVE-2016-1531", + "html_url": "https:\/\/github.com\/NyxByt3\/CVE-2016-1531", "description": null, "fork": false, "created_at": "2023-03-17T14:30:15Z", diff --git a/2018/CVE-2018-0296.json b/2018/CVE-2018-0296.json index 9fc5c8a307..f87feed043 100644 --- a/2018/CVE-2018-0296.json +++ b/2018/CVE-2018-0296.json @@ -43,10 +43,10 @@ "description": "Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.", "fork": false, "created_at": "2018-06-21T15:44:29Z", - "updated_at": "2024-08-12T19:39:29Z", + "updated_at": "2024-09-25T11:21:13Z", "pushed_at": "2024-02-15T22:16:16Z", - "stargazers_count": 200, - "watchers_count": 200, + "stargazers_count": 201, + "watchers_count": 201, "has_discussions": false, "forks_count": 68, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 68, - "watchers": 200, + "watchers": 201, "score": 0, "subscribers_count": 8 }, diff --git a/2018/CVE-2018-17240.json b/2018/CVE-2018-17240.json index c5bcd5a8bb..2bfa232b0a 100644 --- a/2018/CVE-2018-17240.json +++ b/2018/CVE-2018-17240.json @@ -44,7 +44,7 @@ "fork": false, "created_at": "2024-01-04T21:44:21Z", "updated_at": "2024-09-19T00:29:58Z", - "pushed_at": "2024-09-19T00:29:57Z", + "pushed_at": "2024-09-25T08:45:17Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, diff --git a/2019/CVE-2019-11043.json b/2019/CVE-2019-11043.json index b04667696e..7c4eeeb3a3 100644 --- a/2019/CVE-2019-11043.json +++ b/2019/CVE-2019-11043.json @@ -509,10 +509,10 @@ "description": "This repository provides a dockerized infrastructure and a python implementation of the CVE-2019-11043 exploit.", "fork": false, "created_at": "2020-05-05T09:43:44Z", - "updated_at": "2024-07-14T10:37:16Z", + "updated_at": "2024-09-25T11:31:52Z", "pushed_at": "2020-05-25T05:53:56Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -521,7 +521,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 7, + "watchers": 8, "score": 0, "subscribers_count": 1 }, diff --git a/2019/CVE-2019-1388.json b/2019/CVE-2019-1388.json index 0f444a3fa5..74ddbc2d18 100644 --- a/2019/CVE-2019-1388.json +++ b/2019/CVE-2019-1388.json @@ -13,10 +13,10 @@ "description": "CVE-2019-1388 UAC提权 (nt authority\\system)", "fork": false, "created_at": "2019-11-21T06:26:27Z", - "updated_at": "2024-08-12T19:55:03Z", + "updated_at": "2024-09-25T12:05:37Z", "pushed_at": "2019-11-21T09:27:59Z", - "stargazers_count": 185, - "watchers_count": 185, + "stargazers_count": 186, + "watchers_count": 186, "has_discussions": false, "forks_count": 56, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 56, - "watchers": 185, + "watchers": 186, "score": 0, "subscribers_count": 4 }, diff --git a/2020/CVE-2020-0668.json b/2020/CVE-2020-0668.json index c3f41a82db..831a0b87d3 100644 --- a/2020/CVE-2020-0668.json +++ b/2020/CVE-2020-0668.json @@ -73,10 +73,10 @@ "description": "CVE-2020-0668 - Microsoft Windows Service Tracing Arbitrary File Move Local Privilege Escalation Vulnerability", "fork": false, "created_at": "2020-02-27T04:09:29Z", - "updated_at": "2023-07-24T16:19:26Z", + "updated_at": "2024-09-25T09:59:05Z", "pushed_at": "2020-02-26T09:24:45Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 23, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 23, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 }, diff --git a/2020/CVE-2020-0683.json b/2020/CVE-2020-0683.json index 979b4abdba..26a05594e1 100644 --- a/2020/CVE-2020-0683.json +++ b/2020/CVE-2020-0683.json @@ -13,10 +13,10 @@ "description": "CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege", "fork": false, "created_at": "2020-02-11T16:42:34Z", - "updated_at": "2024-09-24T16:58:49Z", + "updated_at": "2024-09-25T10:00:17Z", "pushed_at": "2021-12-23T16:28:28Z", - "stargazers_count": 336, - "watchers_count": 336, + "stargazers_count": 337, + "watchers_count": 337, "has_discussions": false, "forks_count": 58, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 58, - "watchers": 336, + "watchers": 337, "score": 0, "subscribers_count": 9 } diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index f201d93826..01224e8ea1 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -1006,10 +1006,10 @@ "description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost", "fork": false, "created_at": "2020-03-30T11:42:56Z", - "updated_at": "2024-09-22T02:14:45Z", + "updated_at": "2024-09-25T10:01:21Z", "pushed_at": "2020-12-07T20:04:27Z", - "stargazers_count": 1296, - "watchers_count": 1296, + "stargazers_count": 1297, + "watchers_count": 1297, "has_discussions": false, "forks_count": 344, "allow_forking": true, @@ -1024,7 +1024,7 @@ ], "visibility": "public", "forks": 344, - "watchers": 1296, + "watchers": 1297, "score": 0, "subscribers_count": 34 }, diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index f3db92672a..765caf97d7 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -1065,10 +1065,10 @@ "description": "CVE-2021-1675 LPE PoC in Nim (PrintNightmare Local Privilege Escalation)", "fork": false, "created_at": "2021-12-05T14:49:32Z", - "updated_at": "2024-08-19T05:58:41Z", + "updated_at": "2024-09-25T08:35:59Z", "pushed_at": "2021-12-05T14:51:28Z", - "stargazers_count": 18, - "watchers_count": 18, + "stargazers_count": 19, + "watchers_count": 19, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -1077,7 +1077,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 18, + "watchers": 19, "score": 0, "subscribers_count": 3 }, diff --git a/2021/CVE-2021-1961.json b/2021/CVE-2021-1961.json index 80d4651a02..c6d7ba27a4 100644 --- a/2021/CVE-2021-1961.json +++ b/2021/CVE-2021-1961.json @@ -13,10 +13,10 @@ "description": "Exploit code for CVE-2021-1961", "fork": false, "created_at": "2022-09-03T13:31:13Z", - "updated_at": "2024-09-10T23:47:58Z", + "updated_at": "2024-09-25T07:44:16Z", "pushed_at": "2022-09-07T11:47:56Z", - "stargazers_count": 105, - "watchers_count": 105, + "stargazers_count": 106, + "watchers_count": 106, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 15, - "watchers": 105, + "watchers": 106, "score": 0, "subscribers_count": 8 } diff --git a/2021/CVE-2021-24959.json b/2021/CVE-2021-24959.json new file mode 100644 index 0000000000..017375bf74 --- /dev/null +++ b/2021/CVE-2021-24959.json @@ -0,0 +1,32 @@ +[ + { + "id": 861757230, + "name": "CVE-2021-24959", + "full_name": "RandomRobbieBF\/CVE-2021-24959", + "owner": { + "login": "RandomRobbieBF", + "id": 51722811, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", + "html_url": "https:\/\/github.com\/RandomRobbieBF" + }, + "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2021-24959", + "description": "WP Email Users <= 1.7.6 - SQL Injection", + "fork": false, + "created_at": "2024-09-23T13:15:34Z", + "updated_at": "2024-09-25T08:13:57Z", + "pushed_at": "2024-09-23T13:19:41Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-30955.json b/2021/CVE-2021-30955.json index 5c2b283e1f..aacd1bb1ca 100644 --- a/2021/CVE-2021-30955.json +++ b/2021/CVE-2021-30955.json @@ -103,10 +103,10 @@ "description": "iOS 15.1 kernel exploit POC for CVE-2021-30955", "fork": false, "created_at": "2022-03-01T12:41:03Z", - "updated_at": "2024-08-26T13:49:24Z", + "updated_at": "2024-09-25T08:36:01Z", "pushed_at": "2022-03-01T16:11:31Z", - "stargazers_count": 251, - "watchers_count": 251, + "stargazers_count": 252, + "watchers_count": 252, "has_discussions": false, "forks_count": 43, "allow_forking": true, @@ -115,7 +115,7 @@ "topics": [], "visibility": "public", "forks": 43, - "watchers": 251, + "watchers": 252, "score": 0, "subscribers_count": 8 }, diff --git a/2021/CVE-2021-42342.json b/2021/CVE-2021-42342.json index 97aac2712f..c5f142b815 100644 --- a/2021/CVE-2021-42342.json +++ b/2021/CVE-2021-42342.json @@ -29,36 +29,6 @@ "score": 0, "subscribers_count": 2 }, - { - "id": 444456600, - "name": "CVE-2021-42342", - "full_name": "Mr-xn\/CVE-2021-42342", - "owner": { - "login": "Mr-xn", - "id": 18260135, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18260135?v=4", - "html_url": "https:\/\/github.com\/Mr-xn" - }, - "html_url": "https:\/\/github.com\/Mr-xn\/CVE-2021-42342", - "description": "CVE-2021-42342 RCE", - "fork": false, - "created_at": "2022-01-04T14:48:59Z", - "updated_at": "2024-08-12T20:19:29Z", - "pushed_at": "2022-01-04T14:54:39Z", - "stargazers_count": 42, - "watchers_count": 42, - "has_discussions": false, - "forks_count": 9, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 9, - "watchers": 42, - "score": 0, - "subscribers_count": 4 - }, { "id": 711394073, "name": "-zeroboo-Gohead-CVE-2021-42342-1", diff --git a/2022/CVE-2022-0316.json b/2022/CVE-2022-0316.json index 76e5e1df93..324b2acbd8 100644 --- a/2022/CVE-2022-0316.json +++ b/2022/CVE-2022-0316.json @@ -18,7 +18,7 @@ "stargazers_count": 11, "watchers_count": 11, "has_discussions": false, - "forks_count": 4, + "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -33,7 +33,7 @@ "shell" ], "visibility": "public", - "forks": 4, + "forks": 5, "watchers": 11, "score": 0, "subscribers_count": 1 diff --git a/2022/CVE-2022-0337.json b/2022/CVE-2022-0337.json index becccbc52e..6a4653d1a9 100644 --- a/2022/CVE-2022-0337.json +++ b/2022/CVE-2022-0337.json @@ -13,10 +13,10 @@ "description": "🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337", "fork": false, "created_at": "2022-03-19T08:10:46Z", - "updated_at": "2024-08-15T14:16:50Z", + "updated_at": "2024-09-25T07:23:48Z", "pushed_at": "2022-09-04T17:28:56Z", - "stargazers_count": 326, - "watchers_count": 326, + "stargazers_count": 327, + "watchers_count": 327, "has_discussions": false, "forks_count": 34, "allow_forking": true, @@ -41,7 +41,7 @@ ], "visibility": "public", "forks": 34, - "watchers": 326, + "watchers": 327, "score": 0, "subscribers_count": 6 }, diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index f08cb82a56..392d409229 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -403,10 +403,10 @@ "description": "The Dirty Pipe Vulnerability", "fork": false, "created_at": "2022-03-08T13:48:55Z", - "updated_at": "2024-07-19T15:31:53Z", + "updated_at": "2024-09-25T08:36:01Z", "pushed_at": "2022-03-08T13:54:08Z", - "stargazers_count": 45, - "watchers_count": 45, + "stargazers_count": 46, + "watchers_count": 46, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -415,7 +415,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 45, + "watchers": 46, "score": 0, "subscribers_count": 2 }, diff --git a/2022/CVE-2022-20452.json b/2022/CVE-2022-20452.json index b9ec66d7de..2910974b04 100644 --- a/2022/CVE-2022-20452.json +++ b/2022/CVE-2022-20452.json @@ -13,10 +13,10 @@ "description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()", "fork": false, "created_at": "2023-01-10T16:24:51Z", - "updated_at": "2024-09-20T20:33:06Z", + "updated_at": "2024-09-25T08:36:08Z", "pushed_at": "2023-04-12T17:28:49Z", - "stargazers_count": 273, - "watchers_count": 273, + "stargazers_count": 274, + "watchers_count": 274, "has_discussions": false, "forks_count": 47, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 47, - "watchers": 273, + "watchers": 274, "score": 0, "subscribers_count": 9 } diff --git a/2022/CVE-2022-22947.json b/2022/CVE-2022-22947.json index 47a211cb78..7a30611846 100644 --- a/2022/CVE-2022-22947.json +++ b/2022/CVE-2022-22947.json @@ -1284,10 +1284,10 @@ "description": "CVE-2022-22947 注入Godzilla内存马", "fork": false, "created_at": "2022-04-26T05:48:27Z", - "updated_at": "2024-08-31T17:19:11Z", + "updated_at": "2024-09-25T07:25:05Z", "pushed_at": "2022-04-26T05:55:58Z", - "stargazers_count": 203, - "watchers_count": 203, + "stargazers_count": 204, + "watchers_count": 204, "has_discussions": false, "forks_count": 28, "allow_forking": true, @@ -1296,7 +1296,7 @@ "topics": [], "visibility": "public", "forks": 28, - "watchers": 203, + "watchers": 204, "score": 0, "subscribers_count": 5 }, diff --git a/2022/CVE-2022-37434.json b/2022/CVE-2022-37434.json index 99f3de52c5..d5395d1ec8 100644 --- a/2022/CVE-2022-37434.json +++ b/2022/CVE-2022-37434.json @@ -13,10 +13,10 @@ "description": "u think that it doesnt but it do", "fork": false, "created_at": "2022-10-15T00:29:38Z", - "updated_at": "2024-07-19T15:31:58Z", + "updated_at": "2024-09-25T08:36:07Z", "pushed_at": "2022-10-15T00:46:03Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 }, diff --git a/2022/CVE-2022-42046.json b/2022/CVE-2022-42046.json index cedc29d7b5..d7bc5b27e7 100644 --- a/2022/CVE-2022-42046.json +++ b/2022/CVE-2022-42046.json @@ -13,10 +13,10 @@ "description": "CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM", "fork": false, "created_at": "2022-08-17T16:45:13Z", - "updated_at": "2024-09-02T09:18:30Z", + "updated_at": "2024-09-25T06:37:01Z", "pushed_at": "2022-12-24T10:29:08Z", - "stargazers_count": 160, - "watchers_count": 160, + "stargazers_count": 161, + "watchers_count": 161, "has_discussions": true, "forks_count": 26, "allow_forking": true, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 26, - "watchers": 160, + "watchers": 161, "score": 0, "subscribers_count": 6 } diff --git a/2022/CVE-2022-46463.json b/2022/CVE-2022-46463.json index ead40f54e2..199da8b110 100644 --- a/2022/CVE-2022-46463.json +++ b/2022/CVE-2022-46463.json @@ -43,10 +43,10 @@ "description": "harbor unauthorized detection", "fork": false, "created_at": "2023-03-21T10:40:19Z", - "updated_at": "2024-08-22T08:25:31Z", + "updated_at": "2024-09-25T07:54:00Z", "pushed_at": "2023-03-28T04:23:42Z", - "stargazers_count": 20, - "watchers_count": 20, + "stargazers_count": 21, + "watchers_count": 21, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 20, + "watchers": 21, "score": 0, "subscribers_count": 2 } diff --git a/2023/CVE-2023-25136.json b/2023/CVE-2023-25136.json index 3e974a312d..b883386616 100644 --- a/2023/CVE-2023-25136.json +++ b/2023/CVE-2023-25136.json @@ -73,10 +73,10 @@ "description": "OpenSSH 9.1 vulnerability mass scan and exploit", "fork": false, "created_at": "2023-02-22T19:44:08Z", - "updated_at": "2024-09-06T00:15:50Z", + "updated_at": "2024-09-25T08:36:09Z", "pushed_at": "2023-03-07T10:43:36Z", - "stargazers_count": 101, - "watchers_count": 101, + "stargazers_count": 102, + "watchers_count": 102, "has_discussions": false, "forks_count": 22, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 22, - "watchers": 101, + "watchers": 102, "score": 0, "subscribers_count": 3 }, diff --git a/2023/CVE-2023-27350.json b/2023/CVE-2023-27350.json index bf450e91d6..38b3d75374 100644 --- a/2023/CVE-2023-27350.json +++ b/2023/CVE-2023-27350.json @@ -78,13 +78,13 @@ "stargazers_count": 46, "watchers_count": 46, "has_discussions": false, - "forks_count": 18, + "forks_count": 19, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 18, + "forks": 19, "watchers": 46, "score": 0, "subscribers_count": 4 diff --git a/2023/CVE-2023-38646.json b/2023/CVE-2023-38646.json index c0e110f0aa..929c78d7a5 100644 --- a/2023/CVE-2023-38646.json +++ b/2023/CVE-2023-38646.json @@ -174,13 +174,13 @@ "stargazers_count": 20, "watchers_count": 20, "has_discussions": false, - "forks_count": 12, + "forks_count": 13, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 12, + "forks": 13, "watchers": 20, "score": 0, "subscribers_count": 0 diff --git a/2023/CVE-2023-42793.json b/2023/CVE-2023-42793.json index 8a51803047..fd48a75f35 100644 --- a/2023/CVE-2023-42793.json +++ b/2023/CVE-2023-42793.json @@ -18,7 +18,7 @@ "stargazers_count": 44, "watchers_count": 44, "has_discussions": false, - "forks_count": 13, + "forks_count": 14, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -29,7 +29,7 @@ "teamcity" ], "visibility": "public", - "forks": 13, + "forks": 14, "watchers": 44, "score": 0, "subscribers_count": 2 diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index 6f884e9629..20467da139 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -18,13 +18,13 @@ "stargazers_count": 1178, "watchers_count": 1178, "has_discussions": false, - "forks_count": 199, + "forks_count": 200, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 199, + "forks": 200, "watchers": 1178, "score": 0, "subscribers_count": 21 diff --git a/2023/CVE-2023-51467.json b/2023/CVE-2023-51467.json index 0fd27f37cc..464735e8dc 100644 --- a/2023/CVE-2023-51467.json +++ b/2023/CVE-2023-51467.json @@ -89,10 +89,10 @@ "description": "A PoC exploit for CVE-2023-51467 - Apache OFBiz Authentication Bypass", "fork": false, "created_at": "2023-12-29T17:47:54Z", - "updated_at": "2024-08-03T02:03:13Z", + "updated_at": "2024-09-25T10:52:29Z", "pushed_at": "2023-12-31T21:29:59Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 11, + "watchers_count": 11, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -106,7 +106,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 10, + "watchers": 11, "score": 0, "subscribers_count": 1 }, @@ -124,10 +124,10 @@ "description": "This repo is a PoC with to exploit CVE-2023-51467 and CVE-2023-49070 preauth RCE vulnerabilities found in Apache OFBiz.", "fork": false, "created_at": "2024-01-02T14:20:10Z", - "updated_at": "2024-06-23T14:32:41Z", + "updated_at": "2024-09-25T10:55:06Z", "pushed_at": "2024-03-24T18:20:52Z", - "stargazers_count": 72, - "watchers_count": 72, + "stargazers_count": 73, + "watchers_count": 73, "has_discussions": false, "forks_count": 12, "allow_forking": true, @@ -136,7 +136,7 @@ "topics": [], "visibility": "public", "forks": 12, - "watchers": 72, + "watchers": 73, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-0015.json b/2024/CVE-2024-0015.json index b46f207623..b17b79e4bb 100644 --- a/2024/CVE-2024-0015.json +++ b/2024/CVE-2024-0015.json @@ -13,10 +13,10 @@ "description": "a demo poc for CVE-2024-0015", "fork": false, "created_at": "2024-03-19T10:00:21Z", - "updated_at": "2024-09-12T06:20:31Z", + "updated_at": "2024-09-25T12:18:28Z", "pushed_at": "2024-08-14T09:53:13Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 12, + "watchers_count": 12, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 11, + "watchers": 12, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-20017.json b/2024/CVE-2024-20017.json index 2a6f8c00d2..064e57acca 100644 --- a/2024/CVE-2024-20017.json +++ b/2024/CVE-2024-20017.json @@ -13,10 +13,10 @@ "description": "exploits for CVE-2024-20017", "fork": false, "created_at": "2024-08-30T05:54:36Z", - "updated_at": "2024-09-25T05:20:30Z", + "updated_at": "2024-09-25T10:01:43Z", "pushed_at": "2024-09-07T10:11:22Z", - "stargazers_count": 80, - "watchers_count": 80, + "stargazers_count": 85, + "watchers_count": 85, "has_discussions": false, "forks_count": 24, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 24, - "watchers": 80, + "watchers": 85, "score": 0, "subscribers_count": 3 } diff --git a/2024/CVE-2024-24401.json b/2024/CVE-2024-24401.json index 0e19d58bd9..fe23e63163 100644 --- a/2024/CVE-2024-24401.json +++ b/2024/CVE-2024-24401.json @@ -13,10 +13,10 @@ "description": "Auto exploitation tool for CVE-2024-24401. ", "fork": false, "created_at": "2024-02-18T20:05:46Z", - "updated_at": "2024-09-15T17:28:35Z", + "updated_at": "2024-09-25T11:24:58Z", "pushed_at": "2024-09-07T03:02:43Z", - "stargazers_count": 24, - "watchers_count": 24, + "stargazers_count": 26, + "watchers_count": 26, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 24, + "watchers": 26, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-26229.json b/2024/CVE-2024-26229.json index c1a9ae1997..d256bdf745 100644 --- a/2024/CVE-2024-26229.json +++ b/2024/CVE-2024-26229.json @@ -13,10 +13,10 @@ "description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code", "fork": false, "created_at": "2024-06-10T17:02:03Z", - "updated_at": "2024-09-18T22:48:02Z", + "updated_at": "2024-09-25T07:04:09Z", "pushed_at": "2024-07-04T10:39:15Z", - "stargazers_count": 309, - "watchers_count": 309, + "stargazers_count": 310, + "watchers_count": 310, "has_discussions": false, "forks_count": 62, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 62, - "watchers": 309, + "watchers": 310, "score": 0, "subscribers_count": 4 }, diff --git a/2024/CVE-2024-28987.json b/2024/CVE-2024-28987.json index f8d8ed42d1..c2865faea2 100644 --- a/2024/CVE-2024-28987.json +++ b/2024/CVE-2024-28987.json @@ -28,5 +28,35 @@ "watchers": 7, "score": 0, "subscribers_count": 1 + }, + { + "id": 862512431, + "name": "CVE-2024-28987", + "full_name": "horizon3ai\/CVE-2024-28987", + "owner": { + "login": "horizon3ai", + "id": 79593994, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79593994?v=4", + "html_url": "https:\/\/github.com\/horizon3ai" + }, + "html_url": "https:\/\/github.com\/horizon3ai\/CVE-2024-28987", + "description": "Proof of Concept Exploit for CVE-2024-28987: SolarWinds Web Help Desk Hardcoded Credential Vulnerability", + "fork": false, + "created_at": "2024-09-24T18:12:38Z", + "updated_at": "2024-09-25T10:21:16Z", + "pushed_at": "2024-09-24T18:27:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-3094.json b/2024/CVE-2024-3094.json index 852cceee1b..0362ff47b5 100644 --- a/2024/CVE-2024-3094.json +++ b/2024/CVE-2024-3094.json @@ -982,19 +982,19 @@ "description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)", "fork": false, "created_at": "2024-04-01T14:28:09Z", - "updated_at": "2024-09-24T17:47:50Z", + "updated_at": "2024-09-25T08:41:01Z", "pushed_at": "2024-04-03T04:58:50Z", - "stargazers_count": 3485, - "watchers_count": 3485, + "stargazers_count": 3486, + "watchers_count": 3486, "has_discussions": false, - "forks_count": 236, + "forks_count": 237, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 236, - "watchers": 3485, + "forks": 237, + "watchers": 3486, "score": 0, "subscribers_count": 39 }, diff --git a/2024/CVE-2024-36991.json b/2024/CVE-2024-36991.json index 18a0fb7b54..8471409819 100644 --- a/2024/CVE-2024-36991.json +++ b/2024/CVE-2024-36991.json @@ -13,10 +13,10 @@ "description": "POC for CVE-2024-36991: This exploit will attempt to read Splunk \/etc\/passwd file.", "fork": false, "created_at": "2024-07-06T00:49:40Z", - "updated_at": "2024-09-20T13:23:52Z", + "updated_at": "2024-09-25T10:19:26Z", "pushed_at": "2024-07-12T00:41:36Z", - "stargazers_count": 108, - "watchers_count": 108, + "stargazers_count": 109, + "watchers_count": 109, "has_discussions": false, "forks_count": 19, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 19, - "watchers": 108, + "watchers": 109, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-38063.json b/2024/CVE-2024-38063.json index c2f064f298..489702a03e 100644 --- a/2024/CVE-2024-38063.json +++ b/2024/CVE-2024-38063.json @@ -406,10 +406,10 @@ "description": "CVE-2024-38063 is a critical security vulnerability in the Windows TCP\/IP stack that allows for remote code execution (RCE)", "fork": false, "created_at": "2024-08-31T13:56:26Z", - "updated_at": "2024-09-22T02:29:01Z", + "updated_at": "2024-09-25T11:13:12Z", "pushed_at": "2024-09-13T14:30:18Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -418,7 +418,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 9, + "watchers": 10, "score": 0, "subscribers_count": 1 }, @@ -623,8 +623,8 @@ "description": null, "fork": false, "created_at": "2024-09-23T11:45:42Z", - "updated_at": "2024-09-23T11:47:02Z", - "pushed_at": "2024-09-23T11:46:58Z", + "updated_at": "2024-09-25T12:01:17Z", + "pushed_at": "2024-09-25T12:01:14Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2024/CVE-2024-38816.json b/2024/CVE-2024-38816.json index e409754868..8703585634 100644 --- a/2024/CVE-2024-38816.json +++ b/2024/CVE-2024-38816.json @@ -28,5 +28,35 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 862846646, + "name": "CVE-2024-38816-PoC", + "full_name": "masa42\/CVE-2024-38816-PoC", + "owner": { + "login": "masa42", + "id": 46730934, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46730934?v=4", + "html_url": "https:\/\/github.com\/masa42" + }, + "html_url": "https:\/\/github.com\/masa42\/CVE-2024-38816-PoC", + "description": "CVE-2024-38816 Proof of Concept", + "fork": false, + "created_at": "2024-09-25T09:36:59Z", + "updated_at": "2024-09-25T10:26:03Z", + "pushed_at": "2024-09-25T10:20:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-43998.json b/2024/CVE-2024-43998.json new file mode 100644 index 0000000000..f095a49102 --- /dev/null +++ b/2024/CVE-2024-43998.json @@ -0,0 +1,32 @@ +[ + { + "id": 855090098, + "name": "CVE-2024-43998", + "full_name": "RandomRobbieBF\/CVE-2024-43998", + "owner": { + "login": "RandomRobbieBF", + "id": 51722811, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", + "html_url": "https:\/\/github.com\/RandomRobbieBF" + }, + "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-43998", + "description": "Blogpoet <= 1.0.2 - Missing Authorization via blogpoet_install_and_activate_plugins()", + "fork": false, + "created_at": "2024-09-10T09:38:20Z", + "updated_at": "2024-09-25T08:14:14Z", + "pushed_at": "2024-09-10T09:45:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-44346.json b/2024/CVE-2024-44346.json index f8bbfd56f8..11f2090d4c 100644 --- a/2024/CVE-2024-44346.json +++ b/2024/CVE-2024-44346.json @@ -13,8 +13,8 @@ "description": "Public Disclosure", "fork": false, "created_at": "2024-09-13T10:27:23Z", - "updated_at": "2024-09-13T10:28:14Z", - "pushed_at": "2024-09-13T10:28:11Z", + "updated_at": "2024-09-25T06:45:26Z", + "pushed_at": "2024-09-25T06:45:23Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2024/CVE-2024-46627.json b/2024/CVE-2024-46627.json new file mode 100644 index 0000000000..0a1d01bdf9 --- /dev/null +++ b/2024/CVE-2024-46627.json @@ -0,0 +1,32 @@ +[ + { + "id": 862873525, + "name": "CVE-2024-46627", + "full_name": "d4lyw\/CVE-2024-46627", + "owner": { + "login": "d4lyw", + "id": 53091736, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53091736?v=4", + "html_url": "https:\/\/github.com\/d4lyw" + }, + "html_url": "https:\/\/github.com\/d4lyw\/CVE-2024-46627", + "description": "CVE-2024-46627 - Incorrect access control in BECN DATAGERRY v2.2 allows attackers to > execute arbitrary commands via crafted web requests.", + "fork": false, + "created_at": "2024-09-25T10:32:53Z", + "updated_at": "2024-09-25T10:52:13Z", + "pushed_at": "2024-09-25T10:52:09Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-47066.json b/2024/CVE-2024-47066.json index 61c2613854..ffd99de58b 100644 --- a/2024/CVE-2024-47066.json +++ b/2024/CVE-2024-47066.json @@ -13,10 +13,10 @@ "description": "Proof-of-Concept for CVE-2024-47066", "fork": false, "created_at": "2024-09-24T09:59:27Z", - "updated_at": "2024-09-24T23:56:49Z", + "updated_at": "2024-09-25T11:12:45Z", "pushed_at": "2024-09-24T15:35:56Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-5084.json b/2024/CVE-2024-5084.json index d7d66c6641..2f75a112a9 100644 --- a/2024/CVE-2024-5084.json +++ b/2024/CVE-2024-5084.json @@ -52,7 +52,7 @@ "description": "Hash Form – Drag & Drop Form Builder <= 1.1.0 - Unauthenticated Arbitrary File Upload to Remote Code Execution", "fork": false, "created_at": "2024-05-27T20:04:10Z", - "updated_at": "2024-09-18T22:48:01Z", + "updated_at": "2024-09-25T09:36:38Z", "pushed_at": "2024-07-17T23:40:18Z", "stargazers_count": 6, "watchers_count": 6, diff --git a/2024/CVE-2024-5274.json b/2024/CVE-2024-5274.json index 1a650f070d..4d0922d3dd 100644 --- a/2024/CVE-2024-5274.json +++ b/2024/CVE-2024-5274.json @@ -13,10 +13,10 @@ "description": "Guardian Code: A Script to Uncover CVE-2024-5274 Vulnerabilities", "fork": false, "created_at": "2024-07-10T02:15:56Z", - "updated_at": "2024-07-12T05:33:12Z", + "updated_at": "2024-09-25T07:17:42Z", "pushed_at": "2024-07-10T08:56:42Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-5324.json b/2024/CVE-2024-5324.json new file mode 100644 index 0000000000..730a06c6bc --- /dev/null +++ b/2024/CVE-2024-5324.json @@ -0,0 +1,36 @@ +[ + { + "id": 811264259, + "name": "CVE-2024-5324", + "full_name": "RandomRobbieBF\/CVE-2024-5324", + "owner": { + "login": "RandomRobbieBF", + "id": 51722811, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", + "html_url": "https:\/\/github.com\/RandomRobbieBF" + }, + "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-5324", + "description": "Login\/Signup Popup ( Inline Form + Woocommerce ) 2.7.1 - 2.7.2 - Missing Authorization to Arbitrary Options Update", + "fork": false, + "created_at": "2024-06-06T09:01:46Z", + "updated_at": "2024-09-25T08:14:30Z", + "pushed_at": "2024-06-06T09:05:05Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "cve-2024-5324", + "easy-login-woocommerce", + "wordpress" + ], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-6592.json b/2024/CVE-2024-6592.json new file mode 100644 index 0000000000..e50c219cb3 --- /dev/null +++ b/2024/CVE-2024-6592.json @@ -0,0 +1,32 @@ +[ + { + "id": 858770133, + "name": "watchguard-sso-client", + "full_name": "RedTeamPentesting\/watchguard-sso-client", + "owner": { + "login": "RedTeamPentesting", + "id": 34096076, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34096076?v=4", + "html_url": "https:\/\/github.com\/RedTeamPentesting" + }, + "html_url": "https:\/\/github.com\/RedTeamPentesting\/watchguard-sso-client", + "description": "Client Implementation for the WatchGuard SSO Agent Protocol used for Security Research (CVE-2024-6592, CVE-2024-6593, CVE-2024-6594)", + "fork": false, + "created_at": "2024-09-17T14:01:10Z", + "updated_at": "2024-09-25T11:54:25Z", + "pushed_at": "2024-09-17T14:12:29Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-7646.json b/2024/CVE-2024-7646.json index a0f0eb6121..1164f7175b 100644 --- a/2024/CVE-2024-7646.json +++ b/2024/CVE-2024-7646.json @@ -28,5 +28,35 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 862891732, + "name": "cve-2024-7646", + "full_name": "dovics\/cve-2024-7646", + "owner": { + "login": "dovics", + "id": 45029442, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45029442?v=4", + "html_url": "https:\/\/github.com\/dovics" + }, + "html_url": "https:\/\/github.com\/dovics\/cve-2024-7646", + "description": "PoC CVE-2024-7646", + "fork": false, + "created_at": "2024-09-25T11:13:07Z", + "updated_at": "2024-09-25T11:15:30Z", + "pushed_at": "2024-09-25T11:13:18Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-8190.json b/2024/CVE-2024-8190.json index 6148c9a194..50c875900b 100644 --- a/2024/CVE-2024-8190.json +++ b/2024/CVE-2024-8190.json @@ -13,10 +13,10 @@ "description": "CVE-2024-8190: Ivanti Cloud Service Appliance Command Injection", "fork": false, "created_at": "2024-09-16T15:33:46Z", - "updated_at": "2024-09-23T08:03:07Z", + "updated_at": "2024-09-25T06:53:56Z", "pushed_at": "2024-09-16T15:43:44Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 9, + "watchers": 10, "score": 0, "subscribers_count": 5 } diff --git a/2024/CVE-2024-8484.json b/2024/CVE-2024-8484.json new file mode 100644 index 0000000000..5cd39134a7 --- /dev/null +++ b/2024/CVE-2024-8484.json @@ -0,0 +1,32 @@ +[ + { + "id": 862372924, + "name": "CVE-2024-8484", + "full_name": "RandomRobbieBF\/CVE-2024-8484", + "owner": { + "login": "RandomRobbieBF", + "id": 51722811, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", + "html_url": "https:\/\/github.com\/RandomRobbieBF" + }, + "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-8484", + "description": "REST API TO MiniProgram <= 4.7.1 - Unauthenticated SQL Injection", + "fork": false, + "created_at": "2024-09-24T13:46:02Z", + "updated_at": "2024-09-25T08:13:24Z", + "pushed_at": "2024-09-24T13:49:32Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/README.md b/README.md index 5ec7785ad7..9e6afc4f64 100644 --- a/README.md +++ b/README.md @@ -1062,6 +1062,13 @@ - [Alchemist3dot14/CVE-2024-5274-Detection](https://github.com/Alchemist3dot14/CVE-2024-5274-Detection) - [mistymntncop/CVE-2024-5274](https://github.com/mistymntncop/CVE-2024-5274) +### CVE-2024-5324 (2024-06-06) + +The Login/Signup Popup ( Inline Form + Woocommerce ) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'import_settings' function in versions 2.7.1 to 2.7.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change arbitrary options on affected sites. This can be used to enable new user registration and set the default role for new users to Administrator. + + +- [RandomRobbieBF/CVE-2024-5324](https://github.com/RandomRobbieBF/CVE-2024-5324) + ### CVE-2024-5326 (2024-05-30) The Post Grid Gutenberg Blocks and WordPress Blog Plugin – PostX plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'postx_presets_callback' function in all versions up to, and including, 4.1.2. This makes it possible for authenticated attackers, with Contributor-level access and above, to change arbitrary options on affected sites. This can be used to enable new user registration and set the default role for new users to Administrator. @@ -1317,6 +1324,9 @@ - [apena-ba/CVE-2024-6536](https://github.com/apena-ba/CVE-2024-6536) +### CVE-2024-6592 +- [RedTeamPentesting/watchguard-sso-client](https://github.com/RedTeamPentesting/watchguard-sso-client) + ### CVE-2024-6624 (2024-07-11) The JSON API User plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 3.9.3. This is due to improper controls on custom user meta fields. This makes it possible for unauthenticated attackers to register as administrators on the site. The plugin requires the JSON API plugin to also be installed. @@ -1404,6 +1414,7 @@ - [r0binak/CVE-2024-7646](https://github.com/r0binak/CVE-2024-7646) +- [dovics/cve-2024-7646](https://github.com/dovics/cve-2024-7646) ### CVE-2024-7703 (2024-08-17) @@ -1464,6 +1475,9 @@ ### CVE-2024-8349 - [karlemilnikka/CVE-2024-8349-and-CVE-2024-8350](https://github.com/karlemilnikka/CVE-2024-8349-and-CVE-2024-8350) +### CVE-2024-8484 +- [RandomRobbieBF/CVE-2024-8484](https://github.com/RandomRobbieBF/CVE-2024-8484) + ### CVE-2024-8504 (2024-09-10) An attacker with authenticated access to VICIdial as an "agent" can execute arbitrary shell commands as the "root" user. This attack can be chained with CVE-2024-8503 to execute arbitrary shell commands starting from an unauthenticated perspective. @@ -3175,6 +3189,7 @@ - [fa-rrel/CVE-2024-28987-POC](https://github.com/fa-rrel/CVE-2024-28987-POC) +- [horizon3ai/CVE-2024-28987](https://github.com/horizon3ai/CVE-2024-28987) ### CVE-2024-28991 (2024-09-12) @@ -4521,6 +4536,7 @@ - [weliveby/cve-2024-38816-demo](https://github.com/weliveby/cve-2024-38816-demo) +- [masa42/CVE-2024-38816-PoC](https://github.com/masa42/CVE-2024-38816-PoC) ### CVE-2024-38856 (2024-08-05) @@ -4931,6 +4947,9 @@ - [KTN1990/CVE-2024-43918](https://github.com/KTN1990/CVE-2024-43918) +### CVE-2024-43998 +- [RandomRobbieBF/CVE-2024-43998](https://github.com/RandomRobbieBF/CVE-2024-43998) + ### CVE-2024-44000 - [absholi7ly/CVE-2024-44000-LiteSpeed-Cache](https://github.com/absholi7ly/CVE-2024-44000-LiteSpeed-Cache) - [gbrsh/CVE-2024-44000](https://github.com/gbrsh/CVE-2024-44000) @@ -5080,6 +5099,9 @@ - [vidura2/CVE-2024-46451](https://github.com/vidura2/CVE-2024-46451) +### CVE-2024-46627 +- [d4lyw/CVE-2024-46627](https://github.com/d4lyw/CVE-2024-46627) + ### CVE-2024-46986 - [vidura2/CVE-2024-46986](https://github.com/vidura2/CVE-2024-46986) @@ -22169,6 +22191,13 @@ - [dikalasenjadatang/CVE-2021-24917](https://github.com/dikalasenjadatang/CVE-2021-24917) - [Cappricio-Securities/CVE-2021-24917](https://github.com/Cappricio-Securities/CVE-2021-24917) +### CVE-2021-24959 (2022-03-14) + +The WP Email Users WordPress plugin through 1.7.6 does not escape the data_raw parameter in the weu_selected_users_1 AJAX action, available to any authenticated users, allowing them to perform SQL injection attacks. + + +- [RandomRobbieBF/CVE-2021-24959](https://github.com/RandomRobbieBF/CVE-2021-24959) + ### CVE-2021-25003 (2022-03-14) The WPCargo Track & Trace WordPress plugin before 6.9.0 contains a file which could allow unauthenticated attackers to write a PHP file anywhere on the web server, leading to RCE @@ -25206,7 +25235,6 @@ - [kimusan/goahead-webserver-pre-5.1.5-RCE-PoC-CVE-2021-42342-](https://github.com/kimusan/goahead-webserver-pre-5.1.5-RCE-PoC-CVE-2021-42342-) -- [Mr-xn/CVE-2021-42342](https://github.com/Mr-xn/CVE-2021-42342) - [ijh4723/-zeroboo-Gohead-CVE-2021-42342-1](https://github.com/ijh4723/-zeroboo-Gohead-CVE-2021-42342-1) ### CVE-2021-42362 (2021-11-17) @@ -42006,7 +42034,7 @@ Exim before 4.86.2, when installed setuid root, allows local users to gain privileges via the perl_startup argument. -- [N3rdyN3xus/CVE-2016-1531](https://github.com/N3rdyN3xus/CVE-2016-1531) +- [NyxByt3/CVE-2016-1531](https://github.com/NyxByt3/CVE-2016-1531) ### CVE-2016-1542 (2016-06-13) @@ -43292,8 +43320,8 @@ - [bongbongco/MS15-034](https://github.com/bongbongco/MS15-034) - [aedoo/CVE-2015-1635-POC](https://github.com/aedoo/CVE-2015-1635-POC) - [limkokholefork/CVE-2015-1635](https://github.com/limkokholefork/CVE-2015-1635) -- [N3rdyN3xus/CVE-2015-1635-POC](https://github.com/N3rdyN3xus/CVE-2015-1635-POC) -- [N3rdyN3xus/CVE-2015-1635](https://github.com/N3rdyN3xus/CVE-2015-1635) +- [NyxByt3/CVE-2015-1635-POC](https://github.com/NyxByt3/CVE-2015-1635-POC) +- [NyxByt3/CVE-2015-1635](https://github.com/NyxByt3/CVE-2015-1635) - [w01ke/CVE-2015-1635-POC](https://github.com/w01ke/CVE-2015-1635-POC) - [SkinAir/ms15-034-Scan](https://github.com/SkinAir/ms15-034-Scan) - [Cappricio-Securities/CVE-2015-1635](https://github.com/Cappricio-Securities/CVE-2015-1635) @@ -43792,7 +43820,7 @@ - [G01d3nW01f/CVE-2015-6668](https://github.com/G01d3nW01f/CVE-2015-6668) -- [N3rdyN3xus/CVE-2015-6668](https://github.com/N3rdyN3xus/CVE-2015-6668) +- [NyxByt3/CVE-2015-6668](https://github.com/NyxByt3/CVE-2015-6668) - [jimdiroffii/CVE-2015-6668](https://github.com/jimdiroffii/CVE-2015-6668) ### CVE-2015-6748 (2017-09-25) @@ -44113,7 +44141,7 @@ - [ingochris/heartpatch.us](https://github.com/ingochris/heartpatch.us) - [BelminD/heartbleed](https://github.com/BelminD/heartbleed) - [pierceoneill/bleeding-heart](https://github.com/pierceoneill/bleeding-heart) -- [N3rdyN3xus/CVE-2014-0160_Heartbleed](https://github.com/N3rdyN3xus/CVE-2014-0160_Heartbleed) +- [NyxByt3/CVE-2014-0160_Heartbleed](https://github.com/NyxByt3/CVE-2014-0160_Heartbleed) - [GardeniaWhite/fuzzing](https://github.com/GardeniaWhite/fuzzing) - [undacmic/heartbleed-proof-of-concept](https://github.com/undacmic/heartbleed-proof-of-concept) - [cbk914/heartbleed-checker](https://github.com/cbk914/heartbleed-checker) @@ -45596,7 +45624,7 @@ - [Madusanka99/OHTS](https://github.com/Madusanka99/OHTS) -- [N3rdyN3xus/CVE-2011-1249](https://github.com/N3rdyN3xus/CVE-2011-1249) +- [NyxByt3/CVE-2011-1249](https://github.com/NyxByt3/CVE-2011-1249) ### CVE-2011-1473 (2012-06-16) @@ -46050,7 +46078,7 @@ - [zaphoxx/zaphoxx-coldfusion](https://github.com/zaphoxx/zaphoxx-coldfusion) -- [N3rdyN3xus/CVE-2009-2265](https://github.com/N3rdyN3xus/CVE-2009-2265) +- [NyxByt3/CVE-2009-2265](https://github.com/NyxByt3/CVE-2009-2265) - [p1ckzi/CVE-2009-2265](https://github.com/p1ckzi/CVE-2009-2265) - [0xConstant/CVE-2009-2265](https://github.com/0xConstant/CVE-2009-2265) @@ -46349,7 +46377,7 @@ - [mr-l0n3lly/CVE-2007-2447](https://github.com/mr-l0n3lly/CVE-2007-2447) - [HerculesRD/PyUsernameMapScriptRCE](https://github.com/HerculesRD/PyUsernameMapScriptRCE) - [Aviksaikat/CVE-2007-2447](https://github.com/Aviksaikat/CVE-2007-2447) -- [N3rdyN3xus/CVE-2007-2447](https://github.com/N3rdyN3xus/CVE-2007-2447) +- [NyxByt3/CVE-2007-2447](https://github.com/NyxByt3/CVE-2007-2447) - [bdunlap9/CVE-2007-2447_python](https://github.com/bdunlap9/CVE-2007-2447_python) - [MikeRega7/CVE-2007-2447-RCE](https://github.com/MikeRega7/CVE-2007-2447-RCE) - [0xTabun/CVE-2007-2447](https://github.com/0xTabun/CVE-2007-2447) @@ -46634,7 +46662,7 @@ distcc 2.x, as used in XCode 1.5 and others, when not configured to restrict access to the server port, allows remote attackers to execute arbitrary commands via compilation jobs, which are executed by the server without authorization checks. -- [N3rdyN3xus/distccd_rce_CVE-2004-2687](https://github.com/N3rdyN3xus/distccd_rce_CVE-2004-2687) +- [NyxByt3/distccd_rce_CVE-2004-2687](https://github.com/NyxByt3/distccd_rce_CVE-2004-2687) - [k4miyo/CVE-2004-2687](https://github.com/k4miyo/CVE-2004-2687) - [ss0wl/CVE-2004-2687_distcc_v1](https://github.com/ss0wl/CVE-2004-2687_distcc_v1)