diff --git a/2014/CVE-2014-3704.json b/2014/CVE-2014-3704.json index 8e270dbfd8..31a204812e 100644 --- a/2014/CVE-2014-3704.json +++ b/2014/CVE-2014-3704.json @@ -60,5 +60,36 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 912989719, + "name": "Drupalgeddon-Python3", + "full_name": "RasmusKnothNielsen\/Drupalgeddon-Python3", + "owner": { + "login": "RasmusKnothNielsen", + "id": 12834690, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12834690?v=4", + "html_url": "https:\/\/github.com\/RasmusKnothNielsen", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/RasmusKnothNielsen\/Drupalgeddon-Python3", + "description": "An rewritten POC on the CVE-2014-3704 ", + "fork": false, + "created_at": "2025-01-06T20:04:24Z", + "updated_at": "2025-01-06T20:18:35Z", + "pushed_at": "2025-01-06T20:18:32Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-14847.json b/2018/CVE-2018-14847.json index 7ca30d0c64..8f7129ec57 100644 --- a/2018/CVE-2018-14847.json +++ b/2018/CVE-2018-14847.json @@ -19,13 +19,13 @@ "stargazers_count": 510, "watchers_count": 510, "has_discussions": false, - "forks_count": 454, + "forks_count": 453, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 454, + "forks": 453, "watchers": 510, "score": 0, "subscribers_count": 57 diff --git a/2020/CVE-2020-0069.json b/2020/CVE-2020-0069.json index bbb839cff3..fe48a6626e 100644 --- a/2020/CVE-2020-0069.json +++ b/2020/CVE-2020-0069.json @@ -33,7 +33,7 @@ "forks": 24, "watchers": 154, "score": 0, - "subscribers_count": 11 + "subscribers_count": 12 }, { "id": 244758802, diff --git a/2020/CVE-2020-0624.json b/2020/CVE-2020-0624.json index 8efd105cbc..6090ca0795 100644 --- a/2020/CVE-2020-0624.json +++ b/2020/CVE-2020-0624.json @@ -28,6 +28,6 @@ "forks": 38, "watchers": 71, "score": 0, - "subscribers_count": 5 + "subscribers_count": 6 } ] \ No newline at end of file diff --git a/2020/CVE-2020-35489.json b/2020/CVE-2020-35489.json index a04e222ff0..e6d860c84f 100644 --- a/2020/CVE-2020-35489.json +++ b/2020/CVE-2020-35489.json @@ -139,5 +139,41 @@ "watchers": 1, "score": 0, "subscribers_count": 0 + }, + { + "id": 913003270, + "name": "poc-cve-2020-35489", + "full_name": "gh202503\/poc-cve-2020-35489", + "owner": { + "login": "gh202503", + "id": 193975604, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/193975604?v=4", + "html_url": "https:\/\/github.com\/gh202503", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/gh202503\/poc-cve-2020-35489", + "description": "poc-CVE-2020-35489", + "fork": false, + "created_at": "2025-01-06T20:45:48Z", + "updated_at": "2025-01-06T21:24:55Z", + "pushed_at": "2025-01-06T21:24:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "cve-2020-35489", + "poc-cve-2020-35489", + "rce", + "rce-exploit" + ], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-21123.json b/2021/CVE-2021-21123.json index 7e249deb09..076fb6d77c 100644 --- a/2021/CVE-2021-21123.json +++ b/2021/CVE-2021-21123.json @@ -14,10 +14,10 @@ "description": "🐱‍💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2021-21123 and 5 more...", "fork": false, "created_at": "2021-03-22T11:53:57Z", - "updated_at": "2024-11-11T16:02:36Z", + "updated_at": "2025-01-06T18:55:22Z", "pushed_at": "2021-03-22T18:24:20Z", - "stargazers_count": 165, - "watchers_count": 165, + "stargazers_count": 164, + "watchers_count": 164, "has_discussions": false, "forks_count": 26, "allow_forking": true, @@ -41,7 +41,7 @@ ], "visibility": "public", "forks": 26, - "watchers": 165, + "watchers": 164, "score": 0, "subscribers_count": 4 } diff --git a/2021/CVE-2021-23017.json b/2021/CVE-2021-23017.json index 496c517217..7bebd8b594 100644 --- a/2021/CVE-2021-23017.json +++ b/2021/CVE-2021-23017.json @@ -45,10 +45,10 @@ "description": "PoC for Nginx 0.6.18 - 1.20.0 Memory Overwrite Vulnerability CVE-2021-23017", "fork": false, "created_at": "2022-06-30T04:39:58Z", - "updated_at": "2024-12-25T00:20:37Z", + "updated_at": "2025-01-06T23:20:07Z", "pushed_at": "2023-11-12T16:29:03Z", - "stargazers_count": 100, - "watchers_count": 100, + "stargazers_count": 101, + "watchers_count": 101, "has_discussions": false, "forks_count": 21, "allow_forking": true, @@ -60,7 +60,7 @@ ], "visibility": "public", "forks": 21, - "watchers": 100, + "watchers": 101, "score": 0, "subscribers_count": 3 }, diff --git a/2021/CVE-2021-26828.json b/2021/CVE-2021-26828.json index f625e7791c..8762a4b887 100644 --- a/2021/CVE-2021-26828.json +++ b/2021/CVE-2021-26828.json @@ -29,36 +29,5 @@ "watchers": 3, "score": 0, "subscribers_count": 2 - }, - { - "id": 912935660, - "name": "CVE-2021-26828", - "full_name": "voidvxvt\/CVE-2021-26828", - "owner": { - "login": "voidvxvt", - "id": 86536790, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86536790?v=4", - "html_url": "https:\/\/github.com\/voidvxvt", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/voidvxvt\/CVE-2021-26828", - "description": "python3 port of https:\/\/github.com\/hev0x\/CVE-2021-26828_ScadaBR_RCE\/blob\/main\/LinScada_RCE.py", - "fork": false, - "created_at": "2025-01-06T17:38:19Z", - "updated_at": "2025-01-06T17:40:18Z", - "pushed_at": "2025-01-06T17:40:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 55b5ff4a57..26b9a19d42 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -12768,7 +12768,7 @@ "fork": false, "created_at": "2025-01-03T10:15:17Z", "updated_at": "2025-01-03T10:15:21Z", - "pushed_at": "2025-01-03T16:36:23Z", + "pushed_at": "2025-01-06T19:10:53Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2021/CVE-2021-46069.json b/2021/CVE-2021-46069.json index ee91aca6c1..0f358f149a 100644 --- a/2021/CVE-2021-46069.json +++ b/2021/CVE-2021-46069.json @@ -29,5 +29,36 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 448068658, + "name": "CVE-2021-46069", + "full_name": "plsanu\/CVE-2021-46069", + "owner": { + "login": "plsanu", + "id": 61007700, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4", + "html_url": "https:\/\/github.com\/plsanu", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/plsanu\/CVE-2021-46069", + "description": "CVE-2021-46069 - A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Mechanic List Section in login panel.", + "fork": false, + "created_at": "2022-01-14T18:27:00Z", + "updated_at": "2023-12-30T08:24:23Z", + "pushed_at": "2022-01-14T18:27:27Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index bc32ca1555..778946352e 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -2897,5 +2897,36 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 913058800, + "name": "CTF-CVE-2022-0847", + "full_name": "JustinYe377\/CTF-CVE-2022-0847", + "owner": { + "login": "JustinYe377", + "id": 97569874, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97569874?v=4", + "html_url": "https:\/\/github.com\/JustinYe377", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/JustinYe377\/CTF-CVE-2022-0847", + "description": null, + "fork": false, + "created_at": "2025-01-07T00:25:12Z", + "updated_at": "2025-01-07T00:25:13Z", + "pushed_at": "2025-01-07T00:25:13Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-21999.json b/2022/CVE-2022-21999.json index d7b736caf9..a4ed0ecba1 100644 --- a/2022/CVE-2022-21999.json +++ b/2022/CVE-2022-21999.json @@ -14,12 +14,12 @@ "description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)", "fork": false, "created_at": "2022-02-08T17:25:44Z", - "updated_at": "2024-12-29T06:32:48Z", + "updated_at": "2025-01-06T20:22:58Z", "pushed_at": "2022-02-09T16:54:09Z", - "stargazers_count": 777, - "watchers_count": 777, + "stargazers_count": 778, + "watchers_count": 778, "has_discussions": false, - "forks_count": 158, + "forks_count": 159, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -28,8 +28,8 @@ "cve-2022-22718" ], "visibility": "public", - "forks": 158, - "watchers": 777, + "forks": 159, + "watchers": 778, "score": 0, "subscribers_count": 15 } diff --git a/2023/CVE-2023-0386.json b/2023/CVE-2023-0386.json index 8778ac958e..bad97c530e 100644 --- a/2023/CVE-2023-0386.json +++ b/2023/CVE-2023-0386.json @@ -107,10 +107,10 @@ "description": "CVE-2023-0386 analysis and Exp", "fork": false, "created_at": "2023-05-06T06:07:23Z", - "updated_at": "2024-11-19T09:49:23Z", + "updated_at": "2025-01-07T00:20:14Z", "pushed_at": "2023-05-06T06:19:25Z", - "stargazers_count": 117, - "watchers_count": 117, + "stargazers_count": 118, + "watchers_count": 118, "has_discussions": false, "forks_count": 21, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 21, - "watchers": 117, + "watchers": 118, "score": 0, "subscribers_count": 4 }, diff --git a/2023/CVE-2023-41425.json b/2023/CVE-2023-41425.json index 712bb8b66a..f6d8aab092 100644 --- a/2023/CVE-2023-41425.json +++ b/2023/CVE-2023-41425.json @@ -383,5 +383,36 @@ "watchers": 1, "score": 0, "subscribers_count": 1 + }, + { + "id": 912981235, + "name": "CVE-2023-41425", + "full_name": "samu21req\/CVE-2023-41425", + "owner": { + "login": "samu21req", + "id": 61760887, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61760887?v=4", + "html_url": "https:\/\/github.com\/samu21req", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/samu21req\/CVE-2023-41425", + "description": null, + "fork": false, + "created_at": "2025-01-06T19:38:36Z", + "updated_at": "2025-01-06T19:44:38Z", + "pushed_at": "2025-01-06T19:44:35Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-41892.json b/2023/CVE-2023-41892.json index cd5d15de40..e172c64ab6 100644 --- a/2023/CVE-2023-41892.json +++ b/2023/CVE-2023-41892.json @@ -14,10 +14,10 @@ "description": "CVE-2023-41892 - Craft CMS Remote Code Execution (RCE)", "fork": false, "created_at": "2023-10-06T01:40:34Z", - "updated_at": "2024-09-27T09:59:05Z", + "updated_at": "2025-01-06T20:18:22Z", "pushed_at": "2023-10-07T03:26:00Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 5, + "watchers": 4, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index 3a7a86250a..17484f7072 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -14,10 +14,10 @@ "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "fork": false, "created_at": "2024-01-16T06:52:02Z", - "updated_at": "2025-01-06T08:21:21Z", + "updated_at": "2025-01-06T23:35:29Z", "pushed_at": "2024-08-18T08:26:46Z", - "stargazers_count": 1362, - "watchers_count": 1362, + "stargazers_count": 1364, + "watchers_count": 1364, "has_discussions": false, "forks_count": 230, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 230, - "watchers": 1362, + "watchers": 1364, "score": 0, "subscribers_count": 21 }, diff --git a/2023/CVE-2023-6931.json b/2023/CVE-2023-6931.json index 25a169c3d2..23ed60d0b8 100644 --- a/2023/CVE-2023-6931.json +++ b/2023/CVE-2023-6931.json @@ -2,20 +2,20 @@ { "id": 912223220, "name": "CVE-2023-6931", - "full_name": "jungju817\/CVE-2023-6931", + "full_name": "K0n9-log\/CVE-2023-6931", "owner": { - "login": "jungju817", + "login": "K0n9-log", "id": 102219883, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102219883?v=4", - "html_url": "https:\/\/github.com\/jungju817", + "html_url": "https:\/\/github.com\/K0n9-log", "user_view_type": "public" }, - "html_url": "https:\/\/github.com\/jungju817\/CVE-2023-6931", + "html_url": "https:\/\/github.com\/K0n9-log\/CVE-2023-6931", "description": "CVE-2023-6931 kernel panic PoC", "fork": false, "created_at": "2025-01-05T00:28:28Z", - "updated_at": "2025-01-05T02:07:34Z", - "pushed_at": "2025-01-05T02:07:31Z", + "updated_at": "2025-01-06T19:31:39Z", + "pushed_at": "2025-01-06T19:31:35Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2024/CVE-2024-0044.json b/2024/CVE-2024-0044.json index 35b7cd4e2a..45d12a263c 100644 --- a/2024/CVE-2024-0044.json +++ b/2024/CVE-2024-0044.json @@ -45,10 +45,10 @@ "description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13", "fork": false, "created_at": "2024-06-18T12:30:53Z", - "updated_at": "2025-01-06T13:26:15Z", + "updated_at": "2025-01-06T23:24:13Z", "pushed_at": "2024-12-02T06:29:52Z", - "stargazers_count": 269, - "watchers_count": 269, + "stargazers_count": 270, + "watchers_count": 270, "has_discussions": false, "forks_count": 62, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 62, - "watchers": 269, + "watchers": 270, "score": 0, "subscribers_count": 7 }, @@ -297,10 +297,10 @@ "description": "PoC and writeup for bypassing the initial patch of CVE-2024-0044, Android run-as any app vulnerability allowing privilege escalation from adb to installed app", "fork": false, "created_at": "2024-09-27T09:02:08Z", - "updated_at": "2025-01-06T12:27:07Z", + "updated_at": "2025-01-06T21:27:29Z", "pushed_at": "2024-09-30T12:48:08Z", - "stargazers_count": 132, - "watchers_count": 132, + "stargazers_count": 133, + "watchers_count": 133, "has_discussions": false, "forks_count": 17, "allow_forking": true, @@ -309,7 +309,7 @@ "topics": [], "visibility": "public", "forks": 17, - "watchers": 132, + "watchers": 133, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-12986.json b/2024/CVE-2024-12986.json index 03f0554031..da2fc44437 100644 --- a/2024/CVE-2024-12986.json +++ b/2024/CVE-2024-12986.json @@ -14,7 +14,7 @@ "description": null, "fork": false, "created_at": "2025-01-04T14:47:09Z", - "updated_at": "2025-01-04T14:58:28Z", + "updated_at": "2025-01-07T00:35:54Z", "pushed_at": "2025-01-04T14:58:25Z", "stargazers_count": 0, "watchers_count": 0, diff --git a/2024/CVE-2024-25641.json b/2024/CVE-2024-25641.json index ab6f31be59..4252412302 100644 --- a/2024/CVE-2024-25641.json +++ b/2024/CVE-2024-25641.json @@ -170,5 +170,36 @@ "watchers": 2, "score": 0, "subscribers_count": 1 + }, + { + "id": 912544022, + "name": "CVE-2024-25641", + "full_name": "D3Ext\/CVE-2024-25641", + "owner": { + "login": "D3Ext", + "id": 67125397, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67125397?v=4", + "html_url": "https:\/\/github.com\/D3Ext", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/D3Ext\/CVE-2024-25641", + "description": "POC exploit for CVE-2024-25641", + "fork": false, + "created_at": "2025-01-05T21:33:18Z", + "updated_at": "2025-01-06T22:33:40Z", + "pushed_at": "2025-01-06T18:50:17Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-28987.json b/2024/CVE-2024-28987.json index cc199e0d63..a5d4d7d923 100644 --- a/2024/CVE-2024-28987.json +++ b/2024/CVE-2024-28987.json @@ -76,8 +76,8 @@ "description": "CVE-2024-28987 Scanner & Exploiter - SolarWinds Web Help Desk", "fork": false, "created_at": "2024-09-30T16:12:14Z", - "updated_at": "2024-12-23T19:58:15Z", - "pushed_at": "2024-12-23T19:58:11Z", + "updated_at": "2025-01-06T20:50:26Z", + "pushed_at": "2025-01-06T20:50:22Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, diff --git a/2024/CVE-2024-49113.json b/2024/CVE-2024-49113.json index 19acf38248..d0915f6bd7 100644 --- a/2024/CVE-2024-49113.json +++ b/2024/CVE-2024-49113.json @@ -14,19 +14,19 @@ "description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113", "fork": false, "created_at": "2025-01-01T15:48:38Z", - "updated_at": "2025-01-06T17:18:21Z", + "updated_at": "2025-01-06T21:56:41Z", "pushed_at": "2025-01-02T16:07:23Z", - "stargazers_count": 364, - "watchers_count": 364, + "stargazers_count": 366, + "watchers_count": 366, "has_discussions": false, - "forks_count": 85, + "forks_count": 86, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 85, - "watchers": 364, + "forks": 86, + "watchers": 366, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-50379.json b/2024/CVE-2024-50379.json index 83c9a29d4f..e51358f1fb 100644 --- a/2024/CVE-2024-50379.json +++ b/2024/CVE-2024-50379.json @@ -200,10 +200,10 @@ "description": "tomcat CVE-2024-50379\/CVE-2024-56337 条件竞争文件上传exp", "fork": false, "created_at": "2024-12-23T07:20:47Z", - "updated_at": "2025-01-06T09:45:01Z", + "updated_at": "2025-01-06T20:17:42Z", "pushed_at": "2024-12-23T07:30:27Z", - "stargazers_count": 61, - "watchers_count": 61, + "stargazers_count": 62, + "watchers_count": 62, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -212,7 +212,7 @@ "topics": [], "visibility": "public", "forks": 15, - "watchers": 61, + "watchers": 62, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-56512.json b/2024/CVE-2024-56512.json index 9abbe5a810..ea73dbc202 100644 --- a/2024/CVE-2024-56512.json +++ b/2024/CVE-2024-56512.json @@ -14,10 +14,10 @@ "description": "A tool to exploit the CVE-2024-56512 vulnerability in Apache NiFi, which allows unauthorized access to sensitive data through improperly secured APIs.", "fork": false, "created_at": "2025-01-06T17:35:33Z", - "updated_at": "2025-01-06T17:51:41Z", + "updated_at": "2025-01-06T23:11:22Z", "pushed_at": "2025-01-06T17:51:38Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-6387.json b/2024/CVE-2024-6387.json index 94d0e8beed..441585ea01 100644 --- a/2024/CVE-2024-6387.json +++ b/2024/CVE-2024-6387.json @@ -2180,10 +2180,10 @@ "description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)", "fork": false, "created_at": "2024-07-08T11:27:49Z", - "updated_at": "2024-12-29T22:55:53Z", + "updated_at": "2025-01-06T19:43:51Z", "pushed_at": "2024-08-22T08:50:25Z", - "stargazers_count": 63, - "watchers_count": 63, + "stargazers_count": 65, + "watchers_count": 65, "has_discussions": false, "forks_count": 29, "allow_forking": true, @@ -2192,7 +2192,7 @@ "topics": [], "visibility": "public", "forks": 29, - "watchers": 63, + "watchers": 65, "score": 0, "subscribers_count": 3 }, @@ -2931,10 +2931,10 @@ "description": null, "fork": false, "created_at": "2025-01-04T00:25:33Z", - "updated_at": "2025-01-04T00:37:18Z", + "updated_at": "2025-01-07T00:11:11Z", "pushed_at": "2025-01-04T00:37:14Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -2943,7 +2943,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 0, + "watchers": 3, "score": 0, "subscribers_count": 1 } diff --git a/README.md b/README.md index b7457ef529..e0a3ae1314 100644 --- a/README.md +++ b/README.md @@ -3864,6 +3864,7 @@ - [Safarchand/CVE-2024-25641](https://github.com/Safarchand/CVE-2024-25641) - [StopThatTalace/CVE-2024-25641-CACTI-RCE-1.2.26](https://github.com/StopThatTalace/CVE-2024-25641-CACTI-RCE-1.2.26) - [XiaomingX/cve-2024-25641-poc](https://github.com/XiaomingX/cve-2024-25641-poc) +- [D3Ext/CVE-2024-25641](https://github.com/D3Ext/CVE-2024-25641) ### CVE-2024-25723 (2024-02-27) @@ -6846,7 +6847,11 @@ - [ooooooo-q/puma_header_normalization-CVE-2024-45614](https://github.com/ooooooo-q/puma_header_normalization-CVE-2024-45614) -### CVE-2024-46209 +### CVE-2024-46209 (2025-01-06) + +A stored cross-site scripting (XSS) vulnerability in the component /media/test.html of REDAXO CMS v5.17.1 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the password parameter. + + - [h4ckr4v3n/CVE-2024-46209](https://github.com/h4ckr4v3n/CVE-2024-46209) ### CVE-2024-46256 (2024-09-27) @@ -9545,7 +9550,7 @@ A heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component can be exploited to achieve local privilege escalation.\n\nA perf_event's read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group().\n\nWe recommend upgrading past commit 382c27f4ed28f803b1f1473ac2d8db0afc795a1b.\n\n -- [jungju817/CVE-2023-6931](https://github.com/jungju817/CVE-2023-6931) +- [K0n9-log/CVE-2023-6931](https://github.com/K0n9-log/CVE-2023-6931) ### CVE-2023-6933 (2024-02-05) @@ -14186,6 +14191,7 @@ - [Diegomjx/CVE-2023-41425-WonderCMS-Authenticated-RCE](https://github.com/Diegomjx/CVE-2023-41425-WonderCMS-Authenticated-RCE) - [0x0d3ad/CVE-2023-41425](https://github.com/0x0d3ad/CVE-2023-41425) - [xpltive/CVE-2023-41425](https://github.com/xpltive/CVE-2023-41425) +- [samu21req/CVE-2023-41425](https://github.com/samu21req/CVE-2023-41425) ### CVE-2023-41436 (2023-09-15) @@ -16824,6 +16830,7 @@ - [xsxtw/CVE-2022-0847](https://github.com/xsxtw/CVE-2022-0847) - [muhammad1596/CVE-2022-0847-dirty-pipe-checker](https://github.com/muhammad1596/CVE-2022-0847-dirty-pipe-checker) - [muhammad1596/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/muhammad1596/CVE-2022-0847-DirtyPipe-Exploits) +- [JustinYe377/CTF-CVE-2022-0847](https://github.com/JustinYe377/CTF-CVE-2022-0847) ### CVE-2022-0848 (2022-03-04) @@ -25887,7 +25894,6 @@ - [hev0x/CVE-2021-26828_ScadaBR_RCE](https://github.com/hev0x/CVE-2021-26828_ScadaBR_RCE) -- [voidvxvt/CVE-2021-26828](https://github.com/voidvxvt/CVE-2021-26828) ### CVE-2021-26832 (2021-04-14) @@ -26056,7 +26062,11 @@ - [synacktiv/CVE-2021-27246_Pwn2Own2020](https://github.com/synacktiv/CVE-2021-27246_Pwn2Own2020) -### CVE-2021-27285 +### CVE-2021-27285 (2025-01-06) + +An issue was discovered in Inspur ClusterEngine v4.0 that allows attackers to gain escalated Local privileges and execute arbitrary commands via /opt/tsce4/torque6/bin/getJobsByShell. + + - [fjh1997/CVE-2021-27285](https://github.com/fjh1997/CVE-2021-27285) ### CVE-2021-27328 (2021-02-19) @@ -29857,6 +29867,7 @@ - [plsanu/Vehicle-Service-Management-System-Mechanic-List-Stored-Cross-Site-Scripting-XSS](https://github.com/plsanu/Vehicle-Service-Management-System-Mechanic-List-Stored-Cross-Site-Scripting-XSS) +- [plsanu/CVE-2021-46069](https://github.com/plsanu/CVE-2021-46069) ### CVE-2021-46070 (2022-01-06) @@ -35198,6 +35209,7 @@ - [X0UCYB3R/Check-WP-CVE-2020-35489](https://github.com/X0UCYB3R/Check-WP-CVE-2020-35489) - [reneoliveirajr/wp_CVE-2020-35489_checker](https://github.com/reneoliveirajr/wp_CVE-2020-35489_checker) - [Cappricio-Securities/CVE-2020-35489](https://github.com/Cappricio-Securities/CVE-2020-35489) +- [gh202503/poc-cve-2020-35489](https://github.com/gh202503/poc-cve-2020-35489) ### CVE-2020-35498 (2021-02-11) @@ -47978,6 +47990,7 @@ - [happynote3966/CVE-2014-3704](https://github.com/happynote3966/CVE-2014-3704) - [AleDiBen/Drupalgeddon](https://github.com/AleDiBen/Drupalgeddon) +- [RasmusKnothNielsen/Drupalgeddon-Python3](https://github.com/RasmusKnothNielsen/Drupalgeddon-Python3) ### CVE-2014-4014 (2014-06-23)