diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index d7ffb6d8d0..e01186f80d 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -43,10 +43,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2024-09-14T03:36:03Z", + "updated_at": "2024-09-15T13:52:05Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 4098, - "watchers_count": 4098, + "stargazers_count": 4099, + "watchers_count": 4099, "has_discussions": false, "forks_count": 1090, "allow_forking": true, @@ -75,7 +75,7 @@ ], "visibility": "public", "forks": 1090, - "watchers": 4098, + "watchers": 4099, "score": 0, "subscribers_count": 148 }, diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 1c4a53e358..51ea6a26b3 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,10 +13,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2024-09-14T03:36:03Z", + "updated_at": "2024-09-15T13:52:05Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 4098, - "watchers_count": 4098, + "stargazers_count": 4099, + "watchers_count": 4099, "has_discussions": false, "forks_count": 1090, "allow_forking": true, @@ -45,7 +45,7 @@ ], "visibility": "public", "forks": 1090, - "watchers": 4098, + "watchers": 4099, "score": 0, "subscribers_count": 148 }, diff --git a/2020/CVE-2020-27950.json b/2020/CVE-2020-27950.json index e4eef30e08..b0d188d74e 100644 --- a/2020/CVE-2020-27950.json +++ b/2020/CVE-2020-27950.json @@ -28,5 +28,35 @@ "watchers": 30, "score": 0, "subscribers_count": 5 + }, + { + "id": 857806320, + "name": "browser-crash-tool", + "full_name": "lyonzon2\/browser-crash-tool", + "owner": { + "login": "lyonzon2", + "id": 67530243, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67530243?v=4", + "html_url": "https:\/\/github.com\/lyonzon2" + }, + "html_url": "https:\/\/github.com\/lyonzon2\/browser-crash-tool", + "description": "A Bash script for Kali Linux that exploits an iOS WebKit vulnerability (CVE-2020-27950) using Metasploit and ngrok. Automates payload delivery with a public URL via ngrok, checks for required tools, handles errors, and provides an easy way to crash browsers for educational purposes only.", + "fork": false, + "created_at": "2024-09-15T16:54:03Z", + "updated_at": "2024-09-15T16:59:49Z", + "pushed_at": "2024-09-15T16:59:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-1782.json b/2021/CVE-2021-1782.json index 96698d75a6..a8c047fcbc 100644 --- a/2021/CVE-2021-1782.json +++ b/2021/CVE-2021-1782.json @@ -43,10 +43,10 @@ "description": null, "fork": false, "created_at": "2021-02-10T14:38:05Z", - "updated_at": "2024-08-12T20:10:15Z", + "updated_at": "2024-09-15T12:45:05Z", "pushed_at": "2021-02-10T14:39:04Z", - "stargazers_count": 37, - "watchers_count": 37, + "stargazers_count": 38, + "watchers_count": 38, "has_discussions": false, "forks_count": 12, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 12, - "watchers": 37, + "watchers": 38, "score": 0, "subscribers_count": 7 } diff --git a/2021/CVE-2021-22005.json b/2021/CVE-2021-22005.json index 0637026ef5..2fd10c3721 100644 --- a/2021/CVE-2021-22005.json +++ b/2021/CVE-2021-22005.json @@ -103,10 +103,10 @@ "description": "CVE-2021-22005批量验证python脚本", "fork": false, "created_at": "2021-09-25T07:19:42Z", - "updated_at": "2024-08-12T20:16:42Z", + "updated_at": "2024-09-15T12:36:18Z", "pushed_at": "2021-09-25T07:58:15Z", - "stargazers_count": 13, - "watchers_count": 13, + "stargazers_count": 12, + "watchers_count": 12, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -115,7 +115,7 @@ "topics": [], "visibility": "public", "forks": 8, - "watchers": 13, + "watchers": 12, "score": 0, "subscribers_count": 1 }, diff --git a/2021/CVE-2021-30955.json b/2021/CVE-2021-30955.json index 256e2de368..5c2b283e1f 100644 --- a/2021/CVE-2021-30955.json +++ b/2021/CVE-2021-30955.json @@ -168,13 +168,13 @@ "stargazers_count": 10, "watchers_count": 10, "has_discussions": false, - "forks_count": 4, + "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 4, + "forks": 3, "watchers": 10, "score": 0, "subscribers_count": 1 diff --git a/2021/CVE-2021-33044.json b/2021/CVE-2021-33044.json index 038d14b1bd..38345f7a20 100644 --- a/2021/CVE-2021-33044.json +++ b/2021/CVE-2021-33044.json @@ -18,13 +18,13 @@ "stargazers_count": 117, "watchers_count": 117, "has_discussions": false, - "forks_count": 29, + "forks_count": 30, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 29, + "forks": 30, "watchers": 117, "score": 0, "subscribers_count": 8 @@ -48,13 +48,13 @@ "stargazers_count": 34, "watchers_count": 34, "has_discussions": false, - "forks_count": 11, + "forks_count": 12, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 11, + "forks": 12, "watchers": 34, "score": 0, "subscribers_count": 3 diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json index 5d98d8c6bc..a447f85507 100644 --- a/2021/CVE-2021-41773.json +++ b/2021/CVE-2021-41773.json @@ -1463,10 +1463,10 @@ "description": "cve-2021-41773 即 cve-2021-42013 批量检测脚本", "fork": false, "created_at": "2021-10-09T11:33:56Z", - "updated_at": "2024-08-12T20:17:07Z", + "updated_at": "2024-09-15T12:36:18Z", "pushed_at": "2021-10-09T12:14:29Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -1475,7 +1475,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 3, + "watchers": 2, "score": 0, "subscribers_count": 1 }, diff --git a/2022/CVE-2022-24112.json b/2022/CVE-2022-24112.json index f21ce945f5..936b3c110c 100644 --- a/2022/CVE-2022-24112.json +++ b/2022/CVE-2022-24112.json @@ -285,10 +285,10 @@ "html_url": "https:\/\/github.com\/btar1gan" }, "html_url": "https:\/\/github.com\/btar1gan\/exploit_CVE-2022-24112", - "description": "New exploit for Apache APISIX 2.12.1 - Remote code execution (RCE)", + "description": "New exploit for Apache APISIX v2.12.1 - Remote code execution (RCE)", "fork": false, "created_at": "2024-06-03T17:33:59Z", - "updated_at": "2024-09-13T20:28:29Z", + "updated_at": "2024-09-15T17:20:39Z", "pushed_at": "2024-06-07T05:09:49Z", "stargazers_count": 0, "watchers_count": 0, diff --git a/2022/CVE-2022-25375.json b/2022/CVE-2022-25375.json index 3d7ffd5030..beebcf4e71 100644 --- a/2022/CVE-2022-25375.json +++ b/2022/CVE-2022-25375.json @@ -13,10 +13,10 @@ "description": "CVE-2022-25375 - Demo exploit of RNDIS USB Gadget", "fork": false, "created_at": "2022-02-17T14:02:58Z", - "updated_at": "2024-08-12T20:20:41Z", + "updated_at": "2024-09-15T12:30:43Z", "pushed_at": "2022-02-20T19:56:48Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 2 } diff --git a/2023/CVE-2023-0297.json b/2023/CVE-2023-0297.json index 580ae39f8d..b874d97468 100644 --- a/2023/CVE-2023-0297.json +++ b/2023/CVE-2023-0297.json @@ -118,5 +118,35 @@ "watchers": 2, "score": 0, "subscribers_count": 1 + }, + { + "id": 857813726, + "name": "exploit_CVE-2023-0297", + "full_name": "btar1gan\/exploit_CVE-2023-0297", + "owner": { + "login": "btar1gan", + "id": 92728059, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92728059?v=4", + "html_url": "https:\/\/github.com\/btar1gan" + }, + "html_url": "https:\/\/github.com\/btar1gan\/exploit_CVE-2023-0297", + "description": "New exploit for pyLoad v0.5.0 - Unauthenticated remote code excecution", + "fork": false, + "created_at": "2024-09-15T17:15:33Z", + "updated_at": "2024-09-15T17:19:52Z", + "pushed_at": "2024-09-15T17:18:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-27566.json b/2023/CVE-2023-27566.json index 8c792e7bdb..d1f91ae536 100644 --- a/2023/CVE-2023-27566.json +++ b/2023/CVE-2023-27566.json @@ -13,12 +13,12 @@ "description": "MOC3ingbird Exploit for Live2D (CVE-2023-27566)", "fork": false, "created_at": "2023-03-03T01:57:28Z", - "updated_at": "2024-08-20T16:35:03Z", + "updated_at": "2024-09-15T14:51:28Z", "pushed_at": "2023-09-19T01:12:41Z", - "stargazers_count": 77, - "watchers_count": 77, + "stargazers_count": 78, + "watchers_count": 78, "has_discussions": true, - "forks_count": 5, + "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -31,8 +31,8 @@ "security-vulnerability" ], "visibility": "public", - "forks": 5, - "watchers": 77, + "forks": 6, + "watchers": 78, "score": 0, "subscribers_count": 2 } diff --git a/2023/CVE-2023-28229.json b/2023/CVE-2023-28229.json index 0c41fcc029..bccd3cde2b 100644 --- a/2023/CVE-2023-28229.json +++ b/2023/CVE-2023-28229.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2023-09-04T07:48:13Z", - "updated_at": "2024-08-16T09:36:35Z", + "updated_at": "2024-09-15T14:13:58Z", "pushed_at": "2024-01-08T03:34:51Z", - "stargazers_count": 127, - "watchers_count": 127, + "stargazers_count": 128, + "watchers_count": 128, "has_discussions": false, "forks_count": 30, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 30, - "watchers": 127, + "watchers": 128, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-28252.json b/2023/CVE-2023-28252.json index 3fb8b53026..34d2024ca5 100644 --- a/2023/CVE-2023-28252.json +++ b/2023/CVE-2023-28252.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2023-06-27T12:22:05Z", - "updated_at": "2024-09-06T00:21:34Z", + "updated_at": "2024-09-15T15:28:05Z", "pushed_at": "2023-07-10T16:57:44Z", - "stargazers_count": 171, - "watchers_count": 171, + "stargazers_count": 170, + "watchers_count": 170, "has_discussions": false, "forks_count": 46, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 46, - "watchers": 171, + "watchers": 170, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-0044.json b/2024/CVE-2024-0044.json index cfdd82ff61..df9f17779a 100644 --- a/2024/CVE-2024-0044.json +++ b/2024/CVE-2024-0044.json @@ -43,10 +43,10 @@ "description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13", "fork": false, "created_at": "2024-06-18T12:30:53Z", - "updated_at": "2024-09-12T12:44:28Z", + "updated_at": "2024-09-15T17:41:39Z", "pushed_at": "2024-07-25T18:12:57Z", - "stargazers_count": 218, - "watchers_count": 218, + "stargazers_count": 219, + "watchers_count": 219, "has_discussions": false, "forks_count": 50, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 50, - "watchers": 218, + "watchers": 219, "score": 0, "subscribers_count": 5 }, diff --git a/2024/CVE-2024-23692.json b/2024/CVE-2024-23692.json index 3664c0ef80..e0a087dcf5 100644 --- a/2024/CVE-2024-23692.json +++ b/2024/CVE-2024-23692.json @@ -283,19 +283,24 @@ "description": "POC - Unauthenticated RCE Flaw in Rejetto HTTP File Server - CVE-2024-23692 ", "fork": false, "created_at": "2024-09-15T12:15:35Z", - "updated_at": "2024-09-15T12:30:15Z", - "pushed_at": "2024-09-15T12:30:12Z", - "stargazers_count": 0, - "watchers_count": 0, + "updated_at": "2024-09-15T14:24:25Z", + "pushed_at": "2024-09-15T14:24:22Z", + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, - "topics": [], + "topics": [ + "cve-2024-23692", + "rce-exploit", + "rejetto-http-file-server", + "unauthenticated-rce" + ], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-24401.json b/2024/CVE-2024-24401.json index e53d6dbc2a..0e19d58bd9 100644 --- a/2024/CVE-2024-24401.json +++ b/2024/CVE-2024-24401.json @@ -13,10 +13,10 @@ "description": "Auto exploitation tool for CVE-2024-24401. ", "fork": false, "created_at": "2024-02-18T20:05:46Z", - "updated_at": "2024-09-14T04:38:57Z", + "updated_at": "2024-09-15T17:28:35Z", "pushed_at": "2024-09-07T03:02:43Z", - "stargazers_count": 23, - "watchers_count": 23, + "stargazers_count": 24, + "watchers_count": 24, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 23, + "watchers": 24, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-27564.json b/2024/CVE-2024-27564.json index c33bc96458..e031344ae8 100644 --- a/2024/CVE-2024-27564.json +++ b/2024/CVE-2024-27564.json @@ -28,5 +28,35 @@ "watchers": 0, "score": 0, "subscribers_count": 0 + }, + { + "id": 857770278, + "name": "CVE-2024-27564", + "full_name": "Quantum-Hacker\/CVE-2024-27564", + "owner": { + "login": "Quantum-Hacker", + "id": 140636140, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/140636140?v=4", + "html_url": "https:\/\/github.com\/Quantum-Hacker" + }, + "html_url": "https:\/\/github.com\/Quantum-Hacker\/CVE-2024-27564", + "description": null, + "fork": false, + "created_at": "2024-09-15T15:11:54Z", + "updated_at": "2024-09-15T15:54:24Z", + "pushed_at": "2024-09-15T15:54:21Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-2876.json b/2024/CVE-2024-2876.json index c55fa22471..dc87df9234 100644 --- a/2024/CVE-2024-2876.json +++ b/2024/CVE-2024-2876.json @@ -43,8 +43,8 @@ "description": null, "fork": false, "created_at": "2024-09-14T16:08:56Z", - "updated_at": "2024-09-14T16:53:31Z", - "pushed_at": "2024-09-14T16:53:28Z", + "updated_at": "2024-09-15T15:53:54Z", + "pushed_at": "2024-09-15T15:53:50Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2024/CVE-2024-29847.json b/2024/CVE-2024-29847.json index 68c60fe7ae..38826871b0 100644 --- a/2024/CVE-2024-29847.json +++ b/2024/CVE-2024-29847.json @@ -18,13 +18,13 @@ "stargazers_count": 8, "watchers_count": 8, "has_discussions": false, - "forks_count": 3, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 3, + "forks": 4, "watchers": 8, "score": 0, "subscribers_count": 4 diff --git a/2024/CVE-2024-33883.json b/2024/CVE-2024-33883.json index d08ecd0da7..54cbc37088 100644 --- a/2024/CVE-2024-33883.json +++ b/2024/CVE-2024-33883.json @@ -13,10 +13,10 @@ "description": "PoC of CVE-2024-33883, RCE vulnerability of ejs.", "fork": false, "created_at": "2024-06-25T18:40:31Z", - "updated_at": "2024-09-02T02:15:25Z", + "updated_at": "2024-09-15T16:58:40Z", "pushed_at": "2024-07-06T19:51:36Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-34716.json b/2024/CVE-2024-34716.json index e51fb1dbc8..bf5bee5a8f 100644 --- a/2024/CVE-2024-34716.json +++ b/2024/CVE-2024-34716.json @@ -1,19 +1,19 @@ [ { "id": 800659974, - "name": "CVE-2024-34716_PoC", - "full_name": "aelmokhtar\/CVE-2024-34716_PoC", + "name": "CVE-2024-34716", + "full_name": "aelmokhtar\/CVE-2024-34716", "owner": { "login": "aelmokhtar", "id": 66908023, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66908023?v=4", "html_url": "https:\/\/github.com\/aelmokhtar" }, - "html_url": "https:\/\/github.com\/aelmokhtar\/CVE-2024-34716_PoC", + "html_url": "https:\/\/github.com\/aelmokhtar\/CVE-2024-34716", "description": null, "fork": false, "created_at": "2024-05-14T18:48:41Z", - "updated_at": "2024-05-15T18:21:48Z", + "updated_at": "2024-09-15T15:32:19Z", "pushed_at": "2024-05-15T18:21:45Z", "stargazers_count": 0, "watchers_count": 0, diff --git a/2024/CVE-2024-36991.json b/2024/CVE-2024-36991.json index d85a6d4df7..115052eee5 100644 --- a/2024/CVE-2024-36991.json +++ b/2024/CVE-2024-36991.json @@ -13,10 +13,10 @@ "description": "POC for CVE-2024-36991: This exploit will attempt to read Splunk \/etc\/passwd file.", "fork": false, "created_at": "2024-07-06T00:49:40Z", - "updated_at": "2024-09-11T09:38:54Z", + "updated_at": "2024-09-15T14:09:02Z", "pushed_at": "2024-07-12T00:41:36Z", - "stargazers_count": 106, - "watchers_count": 106, + "stargazers_count": 107, + "watchers_count": 107, "has_discussions": false, "forks_count": 18, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 18, - "watchers": 106, + "watchers": 107, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-38063.json b/2024/CVE-2024-38063.json index 3268b952f5..5cf624c584 100644 --- a/2024/CVE-2024-38063.json +++ b/2024/CVE-2024-38063.json @@ -256,10 +256,10 @@ "description": "poc for CVE-2024-38063 (RCE in tcpip.sys)", "fork": false, "created_at": "2024-08-24T18:25:46Z", - "updated_at": "2024-09-15T07:47:50Z", + "updated_at": "2024-09-15T17:05:39Z", "pushed_at": "2024-08-27T12:22:39Z", - "stargazers_count": 570, - "watchers_count": 570, + "stargazers_count": 572, + "watchers_count": 572, "has_discussions": false, "forks_count": 103, "allow_forking": true, @@ -268,7 +268,7 @@ "topics": [], "visibility": "public", "forks": 103, - "watchers": 570, + "watchers": 572, "score": 0, "subscribers_count": 4 }, diff --git a/2024/CVE-2024-38127.json b/2024/CVE-2024-38127.json index b4c97a192f..69fc1e287c 100644 --- a/2024/CVE-2024-38127.json +++ b/2024/CVE-2024-38127.json @@ -18,13 +18,13 @@ "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 2, "watchers": 0, "score": 0, "subscribers_count": 0 diff --git a/2024/CVE-2024-6387.json b/2024/CVE-2024-6387.json index a2cdb1ae2e..aac67e4b56 100644 --- a/2024/CVE-2024-6387.json +++ b/2024/CVE-2024-6387.json @@ -140,10 +140,10 @@ "description": "PoC RCE in OpenSSH", "fork": false, "created_at": "2024-07-01T12:51:18Z", - "updated_at": "2024-09-04T22:58:20Z", + "updated_at": "2024-09-15T17:00:44Z", "pushed_at": "2024-07-01T13:34:47Z", - "stargazers_count": 20, - "watchers_count": 20, + "stargazers_count": 21, + "watchers_count": 21, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -152,7 +152,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 20, + "watchers": 21, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-8504.json b/2024/CVE-2024-8504.json index e31888ae98..cc5b4468e6 100644 --- a/2024/CVE-2024-8504.json +++ b/2024/CVE-2024-8504.json @@ -13,10 +13,10 @@ "description": "VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)", "fork": false, "created_at": "2024-09-14T06:27:11Z", - "updated_at": "2024-09-15T12:24:26Z", - "pushed_at": "2024-09-14T06:32:51Z", - "stargazers_count": 9, - "watchers_count": 9, + "updated_at": "2024-09-15T17:24:13Z", + "pushed_at": "2024-09-15T15:32:42Z", + "stargazers_count": 13, + "watchers_count": 13, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 9, + "watchers": 13, "score": 0, "subscribers_count": 3 } diff --git a/README.md b/README.md index 381a9bfec0..961184df8c 100644 --- a/README.md +++ b/README.md @@ -2923,6 +2923,7 @@ - [MuhammadWaseem29/SSRF-Exploit-CVE-2024-27564](https://github.com/MuhammadWaseem29/SSRF-Exploit-CVE-2024-27564) +- [Quantum-Hacker/CVE-2024-27564](https://github.com/Quantum-Hacker/CVE-2024-27564) ### CVE-2024-27619 (2024-03-29) @@ -3987,7 +3988,7 @@ PrestaShop is an open source e-commerce web application. A cross-site scripting (XSS) vulnerability that only affects PrestaShops with customer-thread feature flag enabled is present starting from PrestaShop 8.1.0 and prior to PrestaShop 8.1.6. When the customer thread feature flag is enabled through the front-office contact form, a hacker can upload a malicious file containing an XSS that will be executed when an admin opens the attached file in back office. The script injected can access the session and the security token, which allows it to perform any authenticated action in the scope of the administrator's right. This vulnerability is patched in 8.1.6. A workaround is to disable the customer-thread feature-flag. -- [aelmokhtar/CVE-2024-34716_PoC](https://github.com/aelmokhtar/CVE-2024-34716_PoC) +- [aelmokhtar/CVE-2024-34716](https://github.com/aelmokhtar/CVE-2024-34716) ### CVE-2024-34831 (2024-09-10) @@ -5042,6 +5043,7 @@ - [Small-ears/CVE-2023-0297](https://github.com/Small-ears/CVE-2023-0297) - [JacobEbben/CVE-2023-0297](https://github.com/JacobEbben/CVE-2023-0297) - [overgrowncarrot1/CVE-2023-0297](https://github.com/overgrowncarrot1/CVE-2023-0297) +- [btar1gan/exploit_CVE-2023-0297](https://github.com/btar1gan/exploit_CVE-2023-0297) ### CVE-2023-0315 (2023-01-16) @@ -31259,6 +31261,7 @@ - [synacktiv/CVE-2020-27950](https://github.com/synacktiv/CVE-2020-27950) +- [lyonzon2/browser-crash-tool](https://github.com/lyonzon2/browser-crash-tool) ### CVE-2020-27955 (2020-11-05)