diff --git a/2004/CVE-2004-1561.json b/2004/CVE-2004-1561.json index 1800e65a15..2fc47f1df4 100644 --- a/2004/CVE-2004-1561.json +++ b/2004/CVE-2004-1561.json @@ -143,13 +143,13 @@ "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 1, + "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 diff --git a/2014/CVE-2014-3566.json b/2014/CVE-2014-3566.json index 5536e02565..c8b86af2a8 100644 --- a/2014/CVE-2014-3566.json +++ b/2014/CVE-2014-3566.json @@ -181,8 +181,8 @@ "description": "Test code for poodle attack (CVE-2014-3566)", "fork": false, "created_at": "2024-11-14T04:35:59Z", - "updated_at": "2025-01-05T15:26:10Z", - "pushed_at": "2025-01-19T11:50:12Z", + "updated_at": "2025-01-21T04:18:14Z", + "pushed_at": "2025-01-21T04:18:11Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 8990b7aa28..b81f91e503 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -45,10 +45,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2025-01-16T10:10:29Z", + "updated_at": "2025-01-21T05:58:48Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 2020, - "watchers_count": 2020, + "stargazers_count": 2021, + "watchers_count": 2021, "has_discussions": true, "forks_count": 339, "allow_forking": true, @@ -78,7 +78,7 @@ ], "visibility": "public", "forks": 339, - "watchers": 2020, + "watchers": 2021, "score": 0, "subscribers_count": 38 }, diff --git a/2014/CVE-2014-6287.json b/2014/CVE-2014-6287.json index 93881c87b1..a2836a3e62 100644 --- a/2014/CVE-2014-6287.json +++ b/2014/CVE-2014-6287.json @@ -174,13 +174,13 @@ "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, - "forks_count": 2, + "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 2, + "forks": 3, "watchers": 2, "score": 0, "subscribers_count": 1 diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 7e7bf5b19f..f63d55c4fe 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -14,10 +14,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2025-01-16T10:10:29Z", + "updated_at": "2025-01-21T05:58:48Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 2020, - "watchers_count": 2020, + "stargazers_count": 2021, + "watchers_count": 2021, "has_discussions": true, "forks_count": 339, "allow_forking": true, @@ -47,7 +47,7 @@ ], "visibility": "public", "forks": 339, - "watchers": 2020, + "watchers": 2021, "score": 0, "subscribers_count": 38 }, diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 6c60fb10a7..77813c2dfa 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -45,10 +45,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2025-01-16T10:10:29Z", + "updated_at": "2025-01-21T05:58:48Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 2020, - "watchers_count": 2020, + "stargazers_count": 2021, + "watchers_count": 2021, "has_discussions": true, "forks_count": 339, "allow_forking": true, @@ -78,7 +78,7 @@ ], "visibility": "public", "forks": 339, - "watchers": 2020, + "watchers": 2021, "score": 0, "subscribers_count": 38 }, diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 6fca708a6a..2fbe680d3e 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -576,10 +576,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2025-01-16T10:10:29Z", + "updated_at": "2025-01-21T05:58:48Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 2020, - "watchers_count": 2020, + "stargazers_count": 2021, + "watchers_count": 2021, "has_discussions": true, "forks_count": 339, "allow_forking": true, @@ -609,7 +609,7 @@ ], "visibility": "public", "forks": 339, - "watchers": 2020, + "watchers": 2021, "score": 0, "subscribers_count": 38 }, diff --git a/2018/CVE-2018-6389.json b/2018/CVE-2018-6389.json index 167fd1739b..31eda99d8d 100644 --- a/2018/CVE-2018-6389.json +++ b/2018/CVE-2018-6389.json @@ -399,13 +399,13 @@ "stargazers_count": 115, "watchers_count": 115, "has_discussions": false, - "forks_count": 60, + "forks_count": 61, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 60, + "forks": 61, "watchers": 115, "score": 0, "subscribers_count": 13 diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index b2125deea5..03d3588643 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -45,10 +45,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2025-01-16T10:30:17Z", + "updated_at": "2025-01-21T06:09:03Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 4155, - "watchers_count": 4155, + "stargazers_count": 4156, + "watchers_count": 4156, "has_discussions": false, "forks_count": 1101, "allow_forking": true, @@ -77,7 +77,7 @@ ], "visibility": "public", "forks": 1101, - "watchers": 4155, + "watchers": 4156, "score": 0, "subscribers_count": 149 }, diff --git a/2019/CVE-2019-2107.json b/2019/CVE-2019-2107.json index f08f86cacc..bbe4e8fb26 100644 --- a/2019/CVE-2019-2107.json +++ b/2019/CVE-2019-2107.json @@ -50,13 +50,13 @@ "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, - "forks_count": 4, + "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 4, + "forks": 5, "watchers": 4, "score": 0, "subscribers_count": 4 diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index fcf8c77654..814ea3e2a5 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -200,10 +200,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2025-01-16T10:10:29Z", + "updated_at": "2025-01-21T05:58:48Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 2020, - "watchers_count": 2020, + "stargazers_count": 2021, + "watchers_count": 2021, "has_discussions": true, "forks_count": 339, "allow_forking": true, @@ -233,7 +233,7 @@ ], "visibility": "public", "forks": 339, - "watchers": 2020, + "watchers": 2021, "score": 0, "subscribers_count": 38 } diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 5b19d9b6b5..7d8fbdfed1 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -14,10 +14,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2025-01-16T10:30:17Z", + "updated_at": "2025-01-21T06:09:03Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 4155, - "watchers_count": 4155, + "stargazers_count": 4156, + "watchers_count": 4156, "has_discussions": false, "forks_count": 1101, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 1101, - "watchers": 4155, + "watchers": 4156, "score": 0, "subscribers_count": 149 }, diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index b089c67f45..b570c2128d 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -14,10 +14,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2025-01-16T10:10:29Z", + "updated_at": "2025-01-21T05:58:48Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 2020, - "watchers_count": 2020, + "stargazers_count": 2021, + "watchers_count": 2021, "has_discussions": true, "forks_count": 339, "allow_forking": true, @@ -47,7 +47,7 @@ ], "visibility": "public", "forks": 339, - "watchers": 2020, + "watchers": 2021, "score": 0, "subscribers_count": 38 }, diff --git a/2020/CVE-2020-2555.json b/2020/CVE-2020-2555.json index f1aaeefeb6..f6af3ef492 100644 --- a/2020/CVE-2020-2555.json +++ b/2020/CVE-2020-2555.json @@ -76,10 +76,10 @@ "description": "Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE", "fork": false, "created_at": "2020-03-07T18:58:09Z", - "updated_at": "2024-11-01T02:37:52Z", + "updated_at": "2025-01-21T00:59:40Z", "pushed_at": "2022-12-15T00:36:55Z", - "stargazers_count": 176, - "watchers_count": 176, + "stargazers_count": 177, + "watchers_count": 177, "has_discussions": false, "forks_count": 56, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 56, - "watchers": 176, + "watchers": 177, "score": 0, "subscribers_count": 4 }, diff --git a/2021/CVE-2021-1732.json b/2021/CVE-2021-1732.json index 66d1433272..7d3d0ac144 100644 --- a/2021/CVE-2021-1732.json +++ b/2021/CVE-2021-1732.json @@ -431,6 +431,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2021/CVE-2021-23017.json b/2021/CVE-2021-23017.json index 7bebd8b594..c990f3ee13 100644 --- a/2021/CVE-2021-23017.json +++ b/2021/CVE-2021-23017.json @@ -146,13 +146,13 @@ "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, - "forks_count": 1, + "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json index 6c35777646..d545042958 100644 --- a/2021/CVE-2021-3129.json +++ b/2021/CVE-2021-3129.json @@ -204,10 +204,10 @@ "description": "Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)", "fork": false, "created_at": "2021-02-18T05:42:13Z", - "updated_at": "2024-12-28T07:43:36Z", + "updated_at": "2025-01-21T03:28:34Z", "pushed_at": "2021-12-14T05:12:17Z", - "stargazers_count": 150, - "watchers_count": 150, + "stargazers_count": 151, + "watchers_count": 151, "has_discussions": false, "forks_count": 58, "allow_forking": true, @@ -216,7 +216,7 @@ "topics": [], "visibility": "public", "forks": 58, - "watchers": 150, + "watchers": 151, "score": 0, "subscribers_count": 1 }, diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json index 8bca314a94..d2af6cdf7f 100644 --- a/2021/CVE-2021-40444.json +++ b/2021/CVE-2021-40444.json @@ -546,7 +546,7 @@ "stargazers_count": 806, "watchers_count": 806, "has_discussions": false, - "forks_count": 170, + "forks_count": 171, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -559,7 +559,7 @@ "remote-code-execution" ], "visibility": "public", - "forks": 170, + "forks": 171, "watchers": 806, "score": 0, "subscribers_count": 18 diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json index 3b5078d465..b8b09f461f 100644 --- a/2021/CVE-2021-42278.json +++ b/2021/CVE-2021-42278.json @@ -50,10 +50,10 @@ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-13T10:28:12Z", - "updated_at": "2025-01-20T01:29:05Z", + "updated_at": "2025-01-21T02:47:29Z", "pushed_at": "2023-01-29T03:31:27Z", - "stargazers_count": 829, - "watchers_count": 829, + "stargazers_count": 830, + "watchers_count": 830, "has_discussions": false, "forks_count": 125, "allow_forking": true, @@ -62,7 +62,7 @@ "topics": [], "visibility": "public", "forks": 125, - "watchers": 829, + "watchers": 830, "score": 0, "subscribers_count": 13 }, diff --git a/2021/CVE-2021-43798.json b/2021/CVE-2021-43798.json index 78ebc6ca3e..5222dd3369 100644 --- a/2021/CVE-2021-43798.json +++ b/2021/CVE-2021-43798.json @@ -208,10 +208,10 @@ "description": "A exploit tool for Grafana Unauthorized arbitrary file reading vulnerability (CVE-2021-43798), it can burst plugins \/ extract secret_key \/ decrypt data_source info automatic.", "fork": false, "created_at": "2021-12-07T15:11:34Z", - "updated_at": "2025-01-01T19:14:43Z", + "updated_at": "2025-01-21T04:37:41Z", "pushed_at": "2024-07-12T14:17:27Z", - "stargazers_count": 248, - "watchers_count": 248, + "stargazers_count": 249, + "watchers_count": 249, "has_discussions": false, "forks_count": 36, "allow_forking": true, @@ -224,7 +224,7 @@ ], "visibility": "public", "forks": 36, - "watchers": 248, + "watchers": 249, "score": 0, "subscribers_count": 6 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 84670e36fd..f97b16d601 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -12713,6 +12713,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2022/CVE-2022-218882.json b/2022/CVE-2022-218882.json index dc567bc560..e8d603e961 100644 --- a/2022/CVE-2022-218882.json +++ b/2022/CVE-2022-218882.json @@ -28,6 +28,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2022/CVE-2022-32250.json b/2022/CVE-2022-32250.json index fd2376d7fe..e18d6239a8 100644 --- a/2022/CVE-2022-32250.json +++ b/2022/CVE-2022-32250.json @@ -143,13 +143,13 @@ "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, - "forks_count": 1, + "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 0, "watchers": 3, "score": 0, "subscribers_count": 1 diff --git a/2022/CVE-2022-40684.json b/2022/CVE-2022-40684.json index 0aab90189c..3cafe5b58d 100644 --- a/2022/CVE-2022-40684.json +++ b/2022/CVE-2022-40684.json @@ -757,7 +757,7 @@ "forks": 16, "watchers": 56, "score": 0, - "subscribers_count": 5 + "subscribers_count": 7 }, { "id": 917925392, @@ -805,8 +805,8 @@ "description": "Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group", "fork": false, "created_at": "2025-01-18T15:32:21Z", - "updated_at": "2025-01-21T00:19:32Z", - "pushed_at": "2025-01-21T00:19:28Z", + "updated_at": "2025-01-21T06:11:21Z", + "pushed_at": "2025-01-21T06:11:17Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2023/CVE-2023-28432.json b/2023/CVE-2023-28432.json index e02f18b6ec..a2c4268159 100644 --- a/2023/CVE-2023-28432.json +++ b/2023/CVE-2023-28432.json @@ -549,13 +549,13 @@ "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 2, "watchers": 0, "score": 0, "subscribers_count": 1 diff --git a/2023/CVE-2023-40028.json b/2023/CVE-2023-40028.json index 660c0f8700..93deb8c2b2 100644 --- a/2023/CVE-2023-40028.json +++ b/2023/CVE-2023-40028.json @@ -223,6 +223,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-4911.json b/2023/CVE-2023-4911.json index 3243eb43d5..cee66746e3 100644 --- a/2023/CVE-2023-4911.json +++ b/2023/CVE-2023-4911.json @@ -45,10 +45,10 @@ "description": "PoC for CVE-2023-4911", "fork": false, "created_at": "2023-10-04T14:12:16Z", - "updated_at": "2025-01-14T01:45:57Z", + "updated_at": "2025-01-21T06:00:30Z", "pushed_at": "2023-10-04T14:16:36Z", - "stargazers_count": 383, - "watchers_count": 383, + "stargazers_count": 384, + "watchers_count": 384, "has_discussions": false, "forks_count": 59, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 59, - "watchers": 383, + "watchers": 384, "score": 0, "subscribers_count": 5 }, diff --git a/2024/CVE-2024-10516.json b/2024/CVE-2024-10516.json index 28ec9500f1..e5e98ce5a4 100644 --- a/2024/CVE-2024-10516.json +++ b/2024/CVE-2024-10516.json @@ -19,13 +19,13 @@ "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 1, + "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-10914.json b/2024/CVE-2024-10914.json index 5c6dad627d..845c898b76 100644 --- a/2024/CVE-2024-10914.json +++ b/2024/CVE-2024-10914.json @@ -282,7 +282,7 @@ "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, - "forks_count": 1, + "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -292,7 +292,7 @@ "rce-exploit" ], "visibility": "public", - "forks": 1, + "forks": 0, "watchers": 4, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-11392.json b/2024/CVE-2024-11392.json index 1eccf66353..f1c3583e0b 100644 --- a/2024/CVE-2024-11392.json +++ b/2024/CVE-2024-11392.json @@ -19,13 +19,13 @@ "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 1, + "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-11394.json b/2024/CVE-2024-11394.json index a079dc0e7e..da00331dae 100644 --- a/2024/CVE-2024-11394.json +++ b/2024/CVE-2024-11394.json @@ -19,13 +19,13 @@ "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 1, + "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-12084.json b/2024/CVE-2024-12084.json new file mode 100644 index 0000000000..5587fd38c7 --- /dev/null +++ b/2024/CVE-2024-12084.json @@ -0,0 +1,33 @@ +[ + { + "id": 919782397, + "name": "cve-2024-12084", + "full_name": "themirze\/cve-2024-12084", + "owner": { + "login": "themirze", + "id": 107270233, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107270233?v=4", + "html_url": "https:\/\/github.com\/themirze", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/themirze\/cve-2024-12084", + "description": null, + "fork": false, + "created_at": "2025-01-21T02:13:14Z", + "updated_at": "2025-01-21T02:13:42Z", + "pushed_at": "2025-01-21T02:13:39Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-12155.json b/2024/CVE-2024-12155.json index 0aef757853..1fa524a6a5 100644 --- a/2024/CVE-2024-12155.json +++ b/2024/CVE-2024-12155.json @@ -19,13 +19,13 @@ "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, - "forks_count": 1, + "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-23897.json b/2024/CVE-2024-23897.json index c486f11e4c..93d053e8eb 100644 --- a/2024/CVE-2024-23897.json +++ b/2024/CVE-2024-23897.json @@ -522,13 +522,13 @@ "stargazers_count": 19, "watchers_count": 19, "has_discussions": true, - "forks_count": 4, + "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 4, + "forks": 5, "watchers": 19, "score": 0, "subscribers_count": 1 @@ -1056,7 +1056,7 @@ "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, - "forks_count": 1, + "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -1071,7 +1071,7 @@ "laboratory" ], "visibility": "public", - "forks": 1, + "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-24549.json b/2024/CVE-2024-24549.json index 9be23802b6..df3c75f1e1 100644 --- a/2024/CVE-2024-24549.json +++ b/2024/CVE-2024-24549.json @@ -50,13 +50,13 @@ "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, - "forks_count": 4, + "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 4, + "forks": 3, "watchers": 6, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-38063.json b/2024/CVE-2024-38063.json index f0bf2ce8ff..efc88182ea 100644 --- a/2024/CVE-2024-38063.json +++ b/2024/CVE-2024-38063.json @@ -875,13 +875,13 @@ "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 1, + "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-41570.json b/2024/CVE-2024-41570.json index 6c9b792862..2d649d40fa 100644 --- a/2024/CVE-2024-41570.json +++ b/2024/CVE-2024-41570.json @@ -14,10 +14,10 @@ "description": "CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit", "fork": false, "created_at": "2024-07-13T19:54:27Z", - "updated_at": "2025-01-20T21:18:51Z", + "updated_at": "2025-01-21T02:49:16Z", "pushed_at": "2024-09-11T20:00:46Z", - "stargazers_count": 49, - "watchers_count": 49, + "stargazers_count": 50, + "watchers_count": 50, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 8, - "watchers": 49, + "watchers": 50, "score": 0, "subscribers_count": 1 }, @@ -60,5 +60,36 @@ "watchers": 6, "score": 0, "subscribers_count": 0 + }, + { + "id": 919853961, + "name": "Havoc-C2-SSRF-to-RCE", + "full_name": "sebr-dev\/Havoc-C2-SSRF-to-RCE", + "owner": { + "login": "sebr-dev", + "id": 192042130, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/192042130?v=4", + "html_url": "https:\/\/github.com\/sebr-dev", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/sebr-dev\/Havoc-C2-SSRF-to-RCE", + "description": "This is a modified version of the CVE-2024-41570 SSRF PoC from @chebuya chained with the auth RCE PoC from @hyperreality. This exploit is made to execute code remotely due to multiple vulnerabilities on Havoc C2 Framework. (https:\/\/github.com\/HavocFramework\/Havoc) ", + "fork": false, + "created_at": "2025-01-21T06:12:33Z", + "updated_at": "2025-01-21T06:16:12Z", + "pushed_at": "2025-01-21T06:13:09Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-42327.json b/2024/CVE-2024-42327.json index fe8ff1894e..2e37eb0089 100644 --- a/2024/CVE-2024-42327.json +++ b/2024/CVE-2024-42327.json @@ -81,13 +81,13 @@ "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, - "forks_count": 1, + "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 @@ -112,13 +112,13 @@ "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, - "forks_count": 1, + "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-43468.json b/2024/CVE-2024-43468.json index e523658f36..7e730c3f12 100644 --- a/2024/CVE-2024-43468.json +++ b/2024/CVE-2024-43468.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2024-11-26T12:39:44Z", - "updated_at": "2025-01-20T15:18:59Z", + "updated_at": "2025-01-21T00:31:22Z", "pushed_at": "2025-01-16T09:48:07Z", - "stargazers_count": 45, - "watchers_count": 45, + "stargazers_count": 46, + "watchers_count": 46, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 45, + "watchers": 46, "score": 0, "subscribers_count": 0 }, diff --git a/2024/CVE-2024-48336.json b/2024/CVE-2024-48336.json index 00c9094c55..7e1d82d0fc 100644 --- a/2024/CVE-2024-48336.json +++ b/2024/CVE-2024-48336.json @@ -14,10 +14,10 @@ "description": "Exploit and writeup for installed app to root privilege escalation through CVE-2024-48336 (Magisk Bug #8279), Privileges Escalation \/ Arbitrary Code Execution Vulnerability", "fork": false, "created_at": "2024-08-24T08:51:08Z", - "updated_at": "2025-01-11T16:49:41Z", + "updated_at": "2025-01-21T01:11:35Z", "pushed_at": "2024-11-05T02:57:25Z", - "stargazers_count": 183, - "watchers_count": 183, + "stargazers_count": 181, + "watchers_count": 181, "has_discussions": false, "forks_count": 30, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 30, - "watchers": 183, + "watchers": 181, "score": 0, "subscribers_count": 8 } diff --git a/2024/CVE-2024-48990.json b/2024/CVE-2024-48990.json index d356b732ab..7766dfdd53 100644 --- a/2024/CVE-2024-48990.json +++ b/2024/CVE-2024-48990.json @@ -236,13 +236,13 @@ "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 1, + "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-49113.json b/2024/CVE-2024-49113.json index 80cea756bc..41aec1c7e1 100644 --- a/2024/CVE-2024-49113.json +++ b/2024/CVE-2024-49113.json @@ -14,10 +14,10 @@ "description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113", "fork": false, "created_at": "2025-01-01T15:48:38Z", - "updated_at": "2025-01-20T17:51:19Z", + "updated_at": "2025-01-21T04:57:02Z", "pushed_at": "2025-01-02T16:07:23Z", - "stargazers_count": 454, - "watchers_count": 454, + "stargazers_count": 455, + "watchers_count": 455, "has_discussions": false, "forks_count": 105, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 105, - "watchers": 454, + "watchers": 455, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-49138.json b/2024/CVE-2024-49138.json index 7593752043..b3d22a079a 100644 --- a/2024/CVE-2024-49138.json +++ b/2024/CVE-2024-49138.json @@ -14,12 +14,12 @@ "description": "POC exploit for CVE-2024-49138", "fork": false, "created_at": "2025-01-15T00:43:37Z", - "updated_at": "2025-01-21T00:31:01Z", + "updated_at": "2025-01-21T06:28:23Z", "pushed_at": "2025-01-20T12:16:52Z", - "stargazers_count": 175, - "watchers_count": 175, + "stargazers_count": 182, + "watchers_count": 182, "has_discussions": false, - "forks_count": 34, + "forks_count": 35, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -30,9 +30,40 @@ "windows" ], "visibility": "public", - "forks": 34, - "watchers": 175, + "forks": 35, + "watchers": 182, "score": 0, "subscribers_count": 2 + }, + { + "id": 919776614, + "name": "CVE-2024-49138-POC", + "full_name": "bananoname\/CVE-2024-49138-POC", + "owner": { + "login": "bananoname", + "id": 177087379, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/177087379?v=4", + "html_url": "https:\/\/github.com\/bananoname", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/bananoname\/CVE-2024-49138-POC", + "description": null, + "fork": false, + "created_at": "2025-01-21T01:50:34Z", + "updated_at": "2025-01-21T02:06:03Z", + "pushed_at": "2025-01-21T02:06:00Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-50379.json b/2024/CVE-2024-50379.json index 5cbaf699e6..6b63929ff3 100644 --- a/2024/CVE-2024-50379.json +++ b/2024/CVE-2024-50379.json @@ -169,19 +169,19 @@ "description": "RCE through a race condition in Apache Tomcat", "fork": false, "created_at": "2024-12-21T05:54:29Z", - "updated_at": "2025-01-06T16:53:23Z", + "updated_at": "2025-01-21T04:21:37Z", "pushed_at": "2024-12-21T08:56:44Z", - "stargazers_count": 47, - "watchers_count": 47, + "stargazers_count": 48, + "watchers_count": 48, "has_discussions": false, - "forks_count": 5, + "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 5, - "watchers": 47, + "forks": 6, + "watchers": 48, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-50677.json b/2024/CVE-2024-50677.json index 2d86e42f0f..e04b1c0772 100644 --- a/2024/CVE-2024-50677.json +++ b/2024/CVE-2024-50677.json @@ -19,13 +19,13 @@ "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, - "forks_count": 1, + "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-54498.json b/2024/CVE-2024-54498.json index 1efab1d44b..8ce50a2df9 100644 --- a/2024/CVE-2024-54498.json +++ b/2024/CVE-2024-54498.json @@ -14,10 +14,10 @@ "description": "Escape macOS Sandbox using sharedfilelistd exploit", "fork": false, "created_at": "2025-01-08T09:55:44Z", - "updated_at": "2025-01-15T11:50:05Z", + "updated_at": "2025-01-21T02:02:48Z", "pushed_at": "2025-01-09T06:34:50Z", - "stargazers_count": 52, - "watchers_count": 52, + "stargazers_count": 53, + "watchers_count": 53, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 8, - "watchers": 52, + "watchers": 53, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-54679.json b/2024/CVE-2024-54679.json index e1636e8d84..48ee4cd625 100644 --- a/2024/CVE-2024-54679.json +++ b/2024/CVE-2024-54679.json @@ -19,13 +19,13 @@ "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, - "forks_count": 1, + "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 0, "watchers": 3, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-55591.json b/2024/CVE-2024-55591.json index acd25856a3..440b6331ca 100644 --- a/2024/CVE-2024-55591.json +++ b/2024/CVE-2024-55591.json @@ -45,10 +45,10 @@ "description": "Checks for authentication bypass vulnerability inFortinet's FortiOS, potentially exploited by remote attackers.", "fork": false, "created_at": "2025-01-18T15:17:07Z", - "updated_at": "2025-01-21T00:19:33Z", - "pushed_at": "2025-01-21T00:19:30Z", - "stargazers_count": 0, - "watchers_count": 0, + "updated_at": "2025-01-21T06:28:57Z", + "pushed_at": "2025-01-21T06:28:54Z", + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-6782.json b/2024/CVE-2024-6782.json index d6bdcc6c2e..7f305cdbbc 100644 --- a/2024/CVE-2024-6782.json +++ b/2024/CVE-2024-6782.json @@ -112,13 +112,13 @@ "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 1, + "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-9593.json b/2024/CVE-2024-9593.json index cd4b64ed00..a7dd17d831 100644 --- a/2024/CVE-2024-9593.json +++ b/2024/CVE-2024-9593.json @@ -14,10 +14,10 @@ "description": "Time Clock <= 1.2.2 & Time Clock Pro <= 1.1.4 - Unauthenticated (Limited) Remote Code Execution", "fork": false, "created_at": "2024-10-18T09:11:03Z", - "updated_at": "2024-10-18T17:57:05Z", + "updated_at": "2025-01-21T06:06:05Z", "pushed_at": "2024-10-18T09:14:40Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 }, diff --git a/2025/CVE-2025-0282.json b/2025/CVE-2025-0282.json index 0da92fb0b7..997e6ba40d 100644 --- a/2025/CVE-2025-0282.json +++ b/2025/CVE-2025-0282.json @@ -107,10 +107,10 @@ "description": "Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)", "fork": false, "created_at": "2025-01-15T18:27:12Z", - "updated_at": "2025-01-20T17:39:52Z", + "updated_at": "2025-01-21T00:33:20Z", "pushed_at": "2025-01-18T16:59:07Z", - "stargazers_count": 17, - "watchers_count": 17, + "stargazers_count": 18, + "watchers_count": 18, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 8, - "watchers": 17, + "watchers": 18, "score": 0, "subscribers_count": 0 }, diff --git a/2025/CVE-2025-21298.json b/2025/CVE-2025-21298.json index 204099a8fe..03053633d3 100644 --- a/2025/CVE-2025-21298.json +++ b/2025/CVE-2025-21298.json @@ -14,19 +14,19 @@ "description": "Proof of concept & details for CVE-2025-21298", "fork": false, "created_at": "2025-01-20T18:16:51Z", - "updated_at": "2025-01-20T18:22:29Z", + "updated_at": "2025-01-21T05:03:51Z", "pushed_at": "2025-01-20T18:22:01Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, - "watchers": 0, + "forks": 2, + "watchers": 2, "score": 0, "subscribers_count": 0 } diff --git a/README.md b/README.md index 1b941758bb..a4dbb65028 100644 --- a/README.md +++ b/README.md @@ -2572,6 +2572,13 @@ - [RandomRobbieBF/CVE-2024-12025](https://github.com/RandomRobbieBF/CVE-2024-12025) +### CVE-2024-12084 (2025-01-15) + +A heap-based buffer overflow flaw was found in the rsync daemon. This issue is due to improper handling of attacker-controlled checksum lengths (s2length) in the code. When MAX_DIGEST_LEN exceeds the fixed SUM_LENGTH (16 bytes), an attacker can write out of bounds in the sum2 buffer. + + +- [themirze/cve-2024-12084](https://github.com/themirze/cve-2024-12084) + ### CVE-2024-12155 (2024-12-06) The SV100 Companion plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the settings_import() function in all versions up to, and including, 2.0.02. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site. @@ -6620,6 +6627,7 @@ - [chebuya/Havoc-C2-SSRF-poc](https://github.com/chebuya/Havoc-C2-SSRF-poc) - [HimmeL-Byte/CVE-2024-41570-SSRF-RCE](https://github.com/HimmeL-Byte/CVE-2024-41570-SSRF-RCE) +- [sebr-dev/Havoc-C2-SSRF-to-RCE](https://github.com/sebr-dev/Havoc-C2-SSRF-to-RCE) ### CVE-2024-41628 (2024-07-26) @@ -7550,6 +7558,7 @@ - [MrAle98/CVE-2024-49138-POC](https://github.com/MrAle98/CVE-2024-49138-POC) +- [bananoname/CVE-2024-49138-POC](https://github.com/bananoname/CVE-2024-49138-POC) ### CVE-2024-49203 (2024-11-20)