diff --git a/2014/CVE-2014-3704.json b/2014/CVE-2014-3704.json
index 8e270dbfd8..31a204812e 100644
--- a/2014/CVE-2014-3704.json
+++ b/2014/CVE-2014-3704.json
@@ -60,5 +60,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 912989719,
+ "name": "Drupalgeddon-Python3",
+ "full_name": "RasmusKnothNielsen\/Drupalgeddon-Python3",
+ "owner": {
+ "login": "RasmusKnothNielsen",
+ "id": 12834690,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12834690?v=4",
+ "html_url": "https:\/\/github.com\/RasmusKnothNielsen",
+ "user_view_type": "public"
+ },
+ "html_url": "https:\/\/github.com\/RasmusKnothNielsen\/Drupalgeddon-Python3",
+ "description": "An rewritten POC on the CVE-2014-3704 ",
+ "fork": false,
+ "created_at": "2025-01-06T20:04:24Z",
+ "updated_at": "2025-01-06T20:18:35Z",
+ "pushed_at": "2025-01-06T20:18:32Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2018/CVE-2018-14847.json b/2018/CVE-2018-14847.json
index 7ca30d0c64..8f7129ec57 100644
--- a/2018/CVE-2018-14847.json
+++ b/2018/CVE-2018-14847.json
@@ -19,13 +19,13 @@
"stargazers_count": 510,
"watchers_count": 510,
"has_discussions": false,
- "forks_count": 454,
+ "forks_count": 453,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 454,
+ "forks": 453,
"watchers": 510,
"score": 0,
"subscribers_count": 57
diff --git a/2020/CVE-2020-0069.json b/2020/CVE-2020-0069.json
index bbb839cff3..fe48a6626e 100644
--- a/2020/CVE-2020-0069.json
+++ b/2020/CVE-2020-0069.json
@@ -33,7 +33,7 @@
"forks": 24,
"watchers": 154,
"score": 0,
- "subscribers_count": 11
+ "subscribers_count": 12
},
{
"id": 244758802,
diff --git a/2020/CVE-2020-0624.json b/2020/CVE-2020-0624.json
index 8efd105cbc..6090ca0795 100644
--- a/2020/CVE-2020-0624.json
+++ b/2020/CVE-2020-0624.json
@@ -28,6 +28,6 @@
"forks": 38,
"watchers": 71,
"score": 0,
- "subscribers_count": 5
+ "subscribers_count": 6
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-35489.json b/2020/CVE-2020-35489.json
index a04e222ff0..e6d860c84f 100644
--- a/2020/CVE-2020-35489.json
+++ b/2020/CVE-2020-35489.json
@@ -139,5 +139,41 @@
"watchers": 1,
"score": 0,
"subscribers_count": 0
+ },
+ {
+ "id": 913003270,
+ "name": "poc-cve-2020-35489",
+ "full_name": "gh202503\/poc-cve-2020-35489",
+ "owner": {
+ "login": "gh202503",
+ "id": 193975604,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/193975604?v=4",
+ "html_url": "https:\/\/github.com\/gh202503",
+ "user_view_type": "public"
+ },
+ "html_url": "https:\/\/github.com\/gh202503\/poc-cve-2020-35489",
+ "description": "poc-CVE-2020-35489",
+ "fork": false,
+ "created_at": "2025-01-06T20:45:48Z",
+ "updated_at": "2025-01-06T21:24:55Z",
+ "pushed_at": "2025-01-06T21:24:51Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2020-35489",
+ "poc-cve-2020-35489",
+ "rce",
+ "rce-exploit"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-21123.json b/2021/CVE-2021-21123.json
index 7e249deb09..076fb6d77c 100644
--- a/2021/CVE-2021-21123.json
+++ b/2021/CVE-2021-21123.json
@@ -14,10 +14,10 @@
"description": "🐱💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2021-21123 and 5 more...",
"fork": false,
"created_at": "2021-03-22T11:53:57Z",
- "updated_at": "2024-11-11T16:02:36Z",
+ "updated_at": "2025-01-06T18:55:22Z",
"pushed_at": "2021-03-22T18:24:20Z",
- "stargazers_count": 165,
- "watchers_count": 165,
+ "stargazers_count": 164,
+ "watchers_count": 164,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@@ -41,7 +41,7 @@
],
"visibility": "public",
"forks": 26,
- "watchers": 165,
+ "watchers": 164,
"score": 0,
"subscribers_count": 4
}
diff --git a/2021/CVE-2021-23017.json b/2021/CVE-2021-23017.json
index 496c517217..7bebd8b594 100644
--- a/2021/CVE-2021-23017.json
+++ b/2021/CVE-2021-23017.json
@@ -45,10 +45,10 @@
"description": "PoC for Nginx 0.6.18 - 1.20.0 Memory Overwrite Vulnerability CVE-2021-23017",
"fork": false,
"created_at": "2022-06-30T04:39:58Z",
- "updated_at": "2024-12-25T00:20:37Z",
+ "updated_at": "2025-01-06T23:20:07Z",
"pushed_at": "2023-11-12T16:29:03Z",
- "stargazers_count": 100,
- "watchers_count": 100,
+ "stargazers_count": 101,
+ "watchers_count": 101,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@@ -60,7 +60,7 @@
],
"visibility": "public",
"forks": 21,
- "watchers": 100,
+ "watchers": 101,
"score": 0,
"subscribers_count": 3
},
diff --git a/2021/CVE-2021-26828.json b/2021/CVE-2021-26828.json
index f625e7791c..8762a4b887 100644
--- a/2021/CVE-2021-26828.json
+++ b/2021/CVE-2021-26828.json
@@ -29,36 +29,5 @@
"watchers": 3,
"score": 0,
"subscribers_count": 2
- },
- {
- "id": 912935660,
- "name": "CVE-2021-26828",
- "full_name": "voidvxvt\/CVE-2021-26828",
- "owner": {
- "login": "voidvxvt",
- "id": 86536790,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86536790?v=4",
- "html_url": "https:\/\/github.com\/voidvxvt",
- "user_view_type": "public"
- },
- "html_url": "https:\/\/github.com\/voidvxvt\/CVE-2021-26828",
- "description": "python3 port of https:\/\/github.com\/hev0x\/CVE-2021-26828_ScadaBR_RCE\/blob\/main\/LinScada_RCE.py",
- "fork": false,
- "created_at": "2025-01-06T17:38:19Z",
- "updated_at": "2025-01-06T17:40:18Z",
- "pushed_at": "2025-01-06T17:40:15Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "has_discussions": false,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 0,
- "watchers": 0,
- "score": 0,
- "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json
index 55b5ff4a57..26b9a19d42 100644
--- a/2021/CVE-2021-44228.json
+++ b/2021/CVE-2021-44228.json
@@ -12768,7 +12768,7 @@
"fork": false,
"created_at": "2025-01-03T10:15:17Z",
"updated_at": "2025-01-03T10:15:21Z",
- "pushed_at": "2025-01-03T16:36:23Z",
+ "pushed_at": "2025-01-06T19:10:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
diff --git a/2021/CVE-2021-46069.json b/2021/CVE-2021-46069.json
index ee91aca6c1..0f358f149a 100644
--- a/2021/CVE-2021-46069.json
+++ b/2021/CVE-2021-46069.json
@@ -29,5 +29,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 448068658,
+ "name": "CVE-2021-46069",
+ "full_name": "plsanu\/CVE-2021-46069",
+ "owner": {
+ "login": "plsanu",
+ "id": 61007700,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
+ "html_url": "https:\/\/github.com\/plsanu",
+ "user_view_type": "public"
+ },
+ "html_url": "https:\/\/github.com\/plsanu\/CVE-2021-46069",
+ "description": "CVE-2021-46069 - A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Mechanic List Section in login panel.",
+ "fork": false,
+ "created_at": "2022-01-14T18:27:00Z",
+ "updated_at": "2023-12-30T08:24:23Z",
+ "pushed_at": "2022-01-14T18:27:27Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json
index bc32ca1555..778946352e 100644
--- a/2022/CVE-2022-0847.json
+++ b/2022/CVE-2022-0847.json
@@ -2897,5 +2897,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 913058800,
+ "name": "CTF-CVE-2022-0847",
+ "full_name": "JustinYe377\/CTF-CVE-2022-0847",
+ "owner": {
+ "login": "JustinYe377",
+ "id": 97569874,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97569874?v=4",
+ "html_url": "https:\/\/github.com\/JustinYe377",
+ "user_view_type": "public"
+ },
+ "html_url": "https:\/\/github.com\/JustinYe377\/CTF-CVE-2022-0847",
+ "description": null,
+ "fork": false,
+ "created_at": "2025-01-07T00:25:12Z",
+ "updated_at": "2025-01-07T00:25:13Z",
+ "pushed_at": "2025-01-07T00:25:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-21999.json b/2022/CVE-2022-21999.json
index d7b736caf9..a4ed0ecba1 100644
--- a/2022/CVE-2022-21999.json
+++ b/2022/CVE-2022-21999.json
@@ -14,12 +14,12 @@
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2022-02-08T17:25:44Z",
- "updated_at": "2024-12-29T06:32:48Z",
+ "updated_at": "2025-01-06T20:22:58Z",
"pushed_at": "2022-02-09T16:54:09Z",
- "stargazers_count": 777,
- "watchers_count": 777,
+ "stargazers_count": 778,
+ "watchers_count": 778,
"has_discussions": false,
- "forks_count": 158,
+ "forks_count": 159,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -28,8 +28,8 @@
"cve-2022-22718"
],
"visibility": "public",
- "forks": 158,
- "watchers": 777,
+ "forks": 159,
+ "watchers": 778,
"score": 0,
"subscribers_count": 15
}
diff --git a/2023/CVE-2023-0386.json b/2023/CVE-2023-0386.json
index 8778ac958e..bad97c530e 100644
--- a/2023/CVE-2023-0386.json
+++ b/2023/CVE-2023-0386.json
@@ -107,10 +107,10 @@
"description": "CVE-2023-0386 analysis and Exp",
"fork": false,
"created_at": "2023-05-06T06:07:23Z",
- "updated_at": "2024-11-19T09:49:23Z",
+ "updated_at": "2025-01-07T00:20:14Z",
"pushed_at": "2023-05-06T06:19:25Z",
- "stargazers_count": 117,
- "watchers_count": 117,
+ "stargazers_count": 118,
+ "watchers_count": 118,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
- "watchers": 117,
+ "watchers": 118,
"score": 0,
"subscribers_count": 4
},
diff --git a/2023/CVE-2023-41425.json b/2023/CVE-2023-41425.json
index 712bb8b66a..f6d8aab092 100644
--- a/2023/CVE-2023-41425.json
+++ b/2023/CVE-2023-41425.json
@@ -383,5 +383,36 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 912981235,
+ "name": "CVE-2023-41425",
+ "full_name": "samu21req\/CVE-2023-41425",
+ "owner": {
+ "login": "samu21req",
+ "id": 61760887,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61760887?v=4",
+ "html_url": "https:\/\/github.com\/samu21req",
+ "user_view_type": "public"
+ },
+ "html_url": "https:\/\/github.com\/samu21req\/CVE-2023-41425",
+ "description": null,
+ "fork": false,
+ "created_at": "2025-01-06T19:38:36Z",
+ "updated_at": "2025-01-06T19:44:38Z",
+ "pushed_at": "2025-01-06T19:44:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2023/CVE-2023-41892.json b/2023/CVE-2023-41892.json
index cd5d15de40..e172c64ab6 100644
--- a/2023/CVE-2023-41892.json
+++ b/2023/CVE-2023-41892.json
@@ -14,10 +14,10 @@
"description": "CVE-2023-41892 - Craft CMS Remote Code Execution (RCE)",
"fork": false,
"created_at": "2023-10-06T01:40:34Z",
- "updated_at": "2024-09-27T09:59:05Z",
+ "updated_at": "2025-01-06T20:18:22Z",
"pushed_at": "2023-10-07T03:26:00Z",
- "stargazers_count": 5,
- "watchers_count": 5,
+ "stargazers_count": 4,
+ "watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
- "watchers": 5,
+ "watchers": 4,
"score": 0,
"subscribers_count": 1
},
diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json
index 3a7a86250a..17484f7072 100644
--- a/2023/CVE-2023-45866.json
+++ b/2023/CVE-2023-45866.json
@@ -14,10 +14,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
- "updated_at": "2025-01-06T08:21:21Z",
+ "updated_at": "2025-01-06T23:35:29Z",
"pushed_at": "2024-08-18T08:26:46Z",
- "stargazers_count": 1362,
- "watchers_count": 1362,
+ "stargazers_count": 1364,
+ "watchers_count": 1364,
"has_discussions": false,
"forks_count": 230,
"allow_forking": true,
@@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 230,
- "watchers": 1362,
+ "watchers": 1364,
"score": 0,
"subscribers_count": 21
},
diff --git a/2023/CVE-2023-6931.json b/2023/CVE-2023-6931.json
index 25a169c3d2..23ed60d0b8 100644
--- a/2023/CVE-2023-6931.json
+++ b/2023/CVE-2023-6931.json
@@ -2,20 +2,20 @@
{
"id": 912223220,
"name": "CVE-2023-6931",
- "full_name": "jungju817\/CVE-2023-6931",
+ "full_name": "K0n9-log\/CVE-2023-6931",
"owner": {
- "login": "jungju817",
+ "login": "K0n9-log",
"id": 102219883,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102219883?v=4",
- "html_url": "https:\/\/github.com\/jungju817",
+ "html_url": "https:\/\/github.com\/K0n9-log",
"user_view_type": "public"
},
- "html_url": "https:\/\/github.com\/jungju817\/CVE-2023-6931",
+ "html_url": "https:\/\/github.com\/K0n9-log\/CVE-2023-6931",
"description": "CVE-2023-6931 kernel panic PoC",
"fork": false,
"created_at": "2025-01-05T00:28:28Z",
- "updated_at": "2025-01-05T02:07:34Z",
- "pushed_at": "2025-01-05T02:07:31Z",
+ "updated_at": "2025-01-06T19:31:39Z",
+ "pushed_at": "2025-01-06T19:31:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
diff --git a/2024/CVE-2024-0044.json b/2024/CVE-2024-0044.json
index 35b7cd4e2a..45d12a263c 100644
--- a/2024/CVE-2024-0044.json
+++ b/2024/CVE-2024-0044.json
@@ -45,10 +45,10 @@
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
"fork": false,
"created_at": "2024-06-18T12:30:53Z",
- "updated_at": "2025-01-06T13:26:15Z",
+ "updated_at": "2025-01-06T23:24:13Z",
"pushed_at": "2024-12-02T06:29:52Z",
- "stargazers_count": 269,
- "watchers_count": 269,
+ "stargazers_count": 270,
+ "watchers_count": 270,
"has_discussions": false,
"forks_count": 62,
"allow_forking": true,
@@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 62,
- "watchers": 269,
+ "watchers": 270,
"score": 0,
"subscribers_count": 7
},
@@ -297,10 +297,10 @@
"description": "PoC and writeup for bypassing the initial patch of CVE-2024-0044, Android run-as any app vulnerability allowing privilege escalation from adb to installed app",
"fork": false,
"created_at": "2024-09-27T09:02:08Z",
- "updated_at": "2025-01-06T12:27:07Z",
+ "updated_at": "2025-01-06T21:27:29Z",
"pushed_at": "2024-09-30T12:48:08Z",
- "stargazers_count": 132,
- "watchers_count": 132,
+ "stargazers_count": 133,
+ "watchers_count": 133,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@@ -309,7 +309,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
- "watchers": 132,
+ "watchers": 133,
"score": 0,
"subscribers_count": 3
},
diff --git a/2024/CVE-2024-12986.json b/2024/CVE-2024-12986.json
index 03f0554031..da2fc44437 100644
--- a/2024/CVE-2024-12986.json
+++ b/2024/CVE-2024-12986.json
@@ -14,7 +14,7 @@
"description": null,
"fork": false,
"created_at": "2025-01-04T14:47:09Z",
- "updated_at": "2025-01-04T14:58:28Z",
+ "updated_at": "2025-01-07T00:35:54Z",
"pushed_at": "2025-01-04T14:58:25Z",
"stargazers_count": 0,
"watchers_count": 0,
diff --git a/2024/CVE-2024-25641.json b/2024/CVE-2024-25641.json
index ab6f31be59..4252412302 100644
--- a/2024/CVE-2024-25641.json
+++ b/2024/CVE-2024-25641.json
@@ -170,5 +170,36 @@
"watchers": 2,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 912544022,
+ "name": "CVE-2024-25641",
+ "full_name": "D3Ext\/CVE-2024-25641",
+ "owner": {
+ "login": "D3Ext",
+ "id": 67125397,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67125397?v=4",
+ "html_url": "https:\/\/github.com\/D3Ext",
+ "user_view_type": "public"
+ },
+ "html_url": "https:\/\/github.com\/D3Ext\/CVE-2024-25641",
+ "description": "POC exploit for CVE-2024-25641",
+ "fork": false,
+ "created_at": "2025-01-05T21:33:18Z",
+ "updated_at": "2025-01-06T22:33:40Z",
+ "pushed_at": "2025-01-06T18:50:17Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2024/CVE-2024-28987.json b/2024/CVE-2024-28987.json
index cc199e0d63..a5d4d7d923 100644
--- a/2024/CVE-2024-28987.json
+++ b/2024/CVE-2024-28987.json
@@ -76,8 +76,8 @@
"description": "CVE-2024-28987 Scanner & Exploiter - SolarWinds Web Help Desk",
"fork": false,
"created_at": "2024-09-30T16:12:14Z",
- "updated_at": "2024-12-23T19:58:15Z",
- "pushed_at": "2024-12-23T19:58:11Z",
+ "updated_at": "2025-01-06T20:50:26Z",
+ "pushed_at": "2025-01-06T20:50:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
diff --git a/2024/CVE-2024-49113.json b/2024/CVE-2024-49113.json
index 19acf38248..d0915f6bd7 100644
--- a/2024/CVE-2024-49113.json
+++ b/2024/CVE-2024-49113.json
@@ -14,19 +14,19 @@
"description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113",
"fork": false,
"created_at": "2025-01-01T15:48:38Z",
- "updated_at": "2025-01-06T17:18:21Z",
+ "updated_at": "2025-01-06T21:56:41Z",
"pushed_at": "2025-01-02T16:07:23Z",
- "stargazers_count": 364,
- "watchers_count": 364,
+ "stargazers_count": 366,
+ "watchers_count": 366,
"has_discussions": false,
- "forks_count": 85,
+ "forks_count": 86,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 85,
- "watchers": 364,
+ "forks": 86,
+ "watchers": 366,
"score": 0,
"subscribers_count": 3
},
diff --git a/2024/CVE-2024-50379.json b/2024/CVE-2024-50379.json
index 83c9a29d4f..e51358f1fb 100644
--- a/2024/CVE-2024-50379.json
+++ b/2024/CVE-2024-50379.json
@@ -200,10 +200,10 @@
"description": "tomcat CVE-2024-50379\/CVE-2024-56337 条件竞争文件上传exp",
"fork": false,
"created_at": "2024-12-23T07:20:47Z",
- "updated_at": "2025-01-06T09:45:01Z",
+ "updated_at": "2025-01-06T20:17:42Z",
"pushed_at": "2024-12-23T07:30:27Z",
- "stargazers_count": 61,
- "watchers_count": 61,
+ "stargazers_count": 62,
+ "watchers_count": 62,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@@ -212,7 +212,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
- "watchers": 61,
+ "watchers": 62,
"score": 0,
"subscribers_count": 3
},
diff --git a/2024/CVE-2024-56512.json b/2024/CVE-2024-56512.json
index 9abbe5a810..ea73dbc202 100644
--- a/2024/CVE-2024-56512.json
+++ b/2024/CVE-2024-56512.json
@@ -14,10 +14,10 @@
"description": "A tool to exploit the CVE-2024-56512 vulnerability in Apache NiFi, which allows unauthorized access to sensitive data through improperly secured APIs.",
"fork": false,
"created_at": "2025-01-06T17:35:33Z",
- "updated_at": "2025-01-06T17:51:41Z",
+ "updated_at": "2025-01-06T23:11:22Z",
"pushed_at": "2025-01-06T17:51:38Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "stargazers_count": 1,
+ "watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 0,
+ "watchers": 1,
"score": 0,
"subscribers_count": 0
}
diff --git a/2024/CVE-2024-6387.json b/2024/CVE-2024-6387.json
index 94d0e8beed..441585ea01 100644
--- a/2024/CVE-2024-6387.json
+++ b/2024/CVE-2024-6387.json
@@ -2180,10 +2180,10 @@
"description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)",
"fork": false,
"created_at": "2024-07-08T11:27:49Z",
- "updated_at": "2024-12-29T22:55:53Z",
+ "updated_at": "2025-01-06T19:43:51Z",
"pushed_at": "2024-08-22T08:50:25Z",
- "stargazers_count": 63,
- "watchers_count": 63,
+ "stargazers_count": 65,
+ "watchers_count": 65,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@@ -2192,7 +2192,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
- "watchers": 63,
+ "watchers": 65,
"score": 0,
"subscribers_count": 3
},
@@ -2931,10 +2931,10 @@
"description": null,
"fork": false,
"created_at": "2025-01-04T00:25:33Z",
- "updated_at": "2025-01-04T00:37:18Z",
+ "updated_at": "2025-01-07T00:11:11Z",
"pushed_at": "2025-01-04T00:37:14Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "stargazers_count": 3,
+ "watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -2943,7 +2943,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 0,
+ "watchers": 3,
"score": 0,
"subscribers_count": 1
}
diff --git a/README.md b/README.md
index b7457ef529..e0a3ae1314 100644
--- a/README.md
+++ b/README.md
@@ -3864,6 +3864,7 @@
- [Safarchand/CVE-2024-25641](https://github.com/Safarchand/CVE-2024-25641)
- [StopThatTalace/CVE-2024-25641-CACTI-RCE-1.2.26](https://github.com/StopThatTalace/CVE-2024-25641-CACTI-RCE-1.2.26)
- [XiaomingX/cve-2024-25641-poc](https://github.com/XiaomingX/cve-2024-25641-poc)
+- [D3Ext/CVE-2024-25641](https://github.com/D3Ext/CVE-2024-25641)
### CVE-2024-25723 (2024-02-27)
@@ -6846,7 +6847,11 @@
- [ooooooo-q/puma_header_normalization-CVE-2024-45614](https://github.com/ooooooo-q/puma_header_normalization-CVE-2024-45614)
-### CVE-2024-46209
+### CVE-2024-46209 (2025-01-06)
+
+A stored cross-site scripting (XSS) vulnerability in the component /media/test.html of REDAXO CMS v5.17.1 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the password parameter.
+
+
- [h4ckr4v3n/CVE-2024-46209](https://github.com/h4ckr4v3n/CVE-2024-46209)
### CVE-2024-46256 (2024-09-27)
@@ -9545,7 +9550,7 @@
A heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component can be exploited to achieve local privilege escalation.\n\nA perf_event's read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group().\n\nWe recommend upgrading past commit 382c27f4ed28f803b1f1473ac2d8db0afc795a1b.\n\n
-- [jungju817/CVE-2023-6931](https://github.com/jungju817/CVE-2023-6931)
+- [K0n9-log/CVE-2023-6931](https://github.com/K0n9-log/CVE-2023-6931)
### CVE-2023-6933 (2024-02-05)
@@ -14186,6 +14191,7 @@
- [Diegomjx/CVE-2023-41425-WonderCMS-Authenticated-RCE](https://github.com/Diegomjx/CVE-2023-41425-WonderCMS-Authenticated-RCE)
- [0x0d3ad/CVE-2023-41425](https://github.com/0x0d3ad/CVE-2023-41425)
- [xpltive/CVE-2023-41425](https://github.com/xpltive/CVE-2023-41425)
+- [samu21req/CVE-2023-41425](https://github.com/samu21req/CVE-2023-41425)
### CVE-2023-41436 (2023-09-15)
@@ -16824,6 +16830,7 @@
- [xsxtw/CVE-2022-0847](https://github.com/xsxtw/CVE-2022-0847)
- [muhammad1596/CVE-2022-0847-dirty-pipe-checker](https://github.com/muhammad1596/CVE-2022-0847-dirty-pipe-checker)
- [muhammad1596/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/muhammad1596/CVE-2022-0847-DirtyPipe-Exploits)
+- [JustinYe377/CTF-CVE-2022-0847](https://github.com/JustinYe377/CTF-CVE-2022-0847)
### CVE-2022-0848 (2022-03-04)
@@ -25887,7 +25894,6 @@
- [hev0x/CVE-2021-26828_ScadaBR_RCE](https://github.com/hev0x/CVE-2021-26828_ScadaBR_RCE)
-- [voidvxvt/CVE-2021-26828](https://github.com/voidvxvt/CVE-2021-26828)
### CVE-2021-26832 (2021-04-14)
@@ -26056,7 +26062,11 @@
- [synacktiv/CVE-2021-27246_Pwn2Own2020](https://github.com/synacktiv/CVE-2021-27246_Pwn2Own2020)
-### CVE-2021-27285
+### CVE-2021-27285 (2025-01-06)
+
+An issue was discovered in Inspur ClusterEngine v4.0 that allows attackers to gain escalated Local privileges and execute arbitrary commands via /opt/tsce4/torque6/bin/getJobsByShell.
+
+
- [fjh1997/CVE-2021-27285](https://github.com/fjh1997/CVE-2021-27285)
### CVE-2021-27328 (2021-02-19)
@@ -29857,6 +29867,7 @@
- [plsanu/Vehicle-Service-Management-System-Mechanic-List-Stored-Cross-Site-Scripting-XSS](https://github.com/plsanu/Vehicle-Service-Management-System-Mechanic-List-Stored-Cross-Site-Scripting-XSS)
+- [plsanu/CVE-2021-46069](https://github.com/plsanu/CVE-2021-46069)
### CVE-2021-46070 (2022-01-06)
@@ -35198,6 +35209,7 @@
- [X0UCYB3R/Check-WP-CVE-2020-35489](https://github.com/X0UCYB3R/Check-WP-CVE-2020-35489)
- [reneoliveirajr/wp_CVE-2020-35489_checker](https://github.com/reneoliveirajr/wp_CVE-2020-35489_checker)
- [Cappricio-Securities/CVE-2020-35489](https://github.com/Cappricio-Securities/CVE-2020-35489)
+- [gh202503/poc-cve-2020-35489](https://github.com/gh202503/poc-cve-2020-35489)
### CVE-2020-35498 (2021-02-11)
@@ -47978,6 +47990,7 @@
- [happynote3966/CVE-2014-3704](https://github.com/happynote3966/CVE-2014-3704)
- [AleDiBen/Drupalgeddon](https://github.com/AleDiBen/Drupalgeddon)
+- [RasmusKnothNielsen/Drupalgeddon-Python3](https://github.com/RasmusKnothNielsen/Drupalgeddon-Python3)
### CVE-2014-4014 (2014-06-23)