diff --git a/2010/CVE-2010-1240.json b/2010/CVE-2010-1240.json index f46ba1945f..dadafc6bb7 100644 --- a/2010/CVE-2010-1240.json +++ b/2010/CVE-2010-1240.json @@ -14,10 +14,10 @@ "description": "This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actually consists of embedded payload. The exploit was made public as CVE-2010-1240. ", "fork": false, "created_at": "2021-06-05T18:59:28Z", - "updated_at": "2024-11-22T12:31:54Z", + "updated_at": "2024-12-08T10:20:00Z", "pushed_at": "2021-06-06T09:41:51Z", - "stargazers_count": 56, - "watchers_count": 56, + "stargazers_count": 57, + "watchers_count": 57, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 56, + "watchers": 57, "score": 0, "subscribers_count": 4 }, diff --git a/2017/CVE-2017-12615.json b/2017/CVE-2017-12615.json index 86853f0934..0ed2b1d4a6 100644 --- a/2017/CVE-2017-12615.json +++ b/2017/CVE-2017-12615.json @@ -355,10 +355,10 @@ "description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含", "fork": false, "created_at": "2022-11-13T11:01:41Z", - "updated_at": "2024-11-21T08:56:26Z", + "updated_at": "2024-12-08T09:30:49Z", "pushed_at": "2022-11-15T09:05:50Z", - "stargazers_count": 203, - "watchers_count": 203, + "stargazers_count": 204, + "watchers_count": 204, "has_discussions": false, "forks_count": 18, "allow_forking": true, @@ -367,7 +367,7 @@ "topics": [], "visibility": "public", "forks": 18, - "watchers": 203, + "watchers": 204, "score": 0, "subscribers_count": 4 }, @@ -417,10 +417,10 @@ "description": "tomcat自动化漏洞扫描利用工具,支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含", "fork": false, "created_at": "2024-08-29T06:38:16Z", - "updated_at": "2024-12-06T03:29:54Z", + "updated_at": "2024-12-08T08:50:03Z", "pushed_at": "2024-11-13T03:12:58Z", - "stargazers_count": 156, - "watchers_count": 156, + "stargazers_count": 157, + "watchers_count": 157, "has_discussions": false, "forks_count": 14, "allow_forking": true, @@ -437,7 +437,7 @@ ], "visibility": "public", "forks": 14, - "watchers": 156, + "watchers": 157, "score": 0, "subscribers_count": 2 }, diff --git a/2017/CVE-2017-20165.json b/2017/CVE-2017-20165.json index 9b686f133d..5411faaf2a 100644 --- a/2017/CVE-2017-20165.json +++ b/2017/CVE-2017-20165.json @@ -15,11 +15,11 @@ "fork": false, "created_at": "2023-01-11T10:20:27Z", "updated_at": "2024-12-05T14:23:33Z", - "pushed_at": "2024-12-05T14:23:30Z", + "pushed_at": "2024-12-08T10:54:53Z", "stargazers_count": 13, "watchers_count": 13, "has_discussions": false, - "forks_count": 12, + "forks_count": 11, "allow_forking": true, "is_template": false, "web_commit_signoff_required": true, @@ -29,7 +29,7 @@ "send" ], "visibility": "public", - "forks": 12, + "forks": 11, "watchers": 13, "score": 0, "subscribers_count": 12 diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index 632d1432ae..dcd7e34617 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -888,10 +888,10 @@ "description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含", "fork": false, "created_at": "2022-11-13T11:01:41Z", - "updated_at": "2024-11-21T08:56:26Z", + "updated_at": "2024-12-08T09:30:49Z", "pushed_at": "2022-11-15T09:05:50Z", - "stargazers_count": 203, - "watchers_count": 203, + "stargazers_count": 204, + "watchers_count": 204, "has_discussions": false, "forks_count": 18, "allow_forking": true, @@ -900,7 +900,7 @@ "topics": [], "visibility": "public", "forks": 18, - "watchers": 203, + "watchers": 204, "score": 0, "subscribers_count": 4 }, @@ -981,10 +981,10 @@ "description": "tomcat自动化漏洞扫描利用工具,支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含", "fork": false, "created_at": "2024-08-29T06:38:16Z", - "updated_at": "2024-12-06T03:29:54Z", + "updated_at": "2024-12-08T08:50:03Z", "pushed_at": "2024-11-13T03:12:58Z", - "stargazers_count": 156, - "watchers_count": 156, + "stargazers_count": 157, + "watchers_count": 157, "has_discussions": false, "forks_count": 14, "allow_forking": true, @@ -1001,7 +1001,7 @@ ], "visibility": "public", "forks": 14, - "watchers": 156, + "watchers": 157, "score": 0, "subscribers_count": 2 }, diff --git a/2021/CVE-2021-23017.json b/2021/CVE-2021-23017.json index 3cb0abbba1..4c073a862c 100644 --- a/2021/CVE-2021-23017.json +++ b/2021/CVE-2021-23017.json @@ -125,5 +125,36 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 900254066, + "name": "CVE-2021-23017-POC", + "full_name": "z3usx01\/CVE-2021-23017-POC", + "owner": { + "login": "z3usx01", + "id": 112891506, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112891506?v=4", + "html_url": "https:\/\/github.com\/z3usx01", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/z3usx01\/CVE-2021-23017-POC", + "description": "The issue only affects nginx if the \"resolver\" directive is used in the configuration file. Further, the attack is only possible if an attacker is able to forge UDP packets from the DNS server.", + "fork": false, + "created_at": "2024-12-08T09:47:52Z", + "updated_at": "2024-12-08T09:52:26Z", + "pushed_at": "2024-12-08T09:52:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json index 87b3f45f07..7a7833b192 100644 --- a/2021/CVE-2021-3129.json +++ b/2021/CVE-2021-3129.json @@ -204,10 +204,10 @@ "description": "Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)", "fork": false, "created_at": "2021-02-18T05:42:13Z", - "updated_at": "2024-12-04T09:45:01Z", + "updated_at": "2024-12-08T07:44:09Z", "pushed_at": "2021-12-14T05:12:17Z", - "stargazers_count": 147, - "watchers_count": 147, + "stargazers_count": 148, + "watchers_count": 148, "has_discussions": false, "forks_count": 58, "allow_forking": true, @@ -216,7 +216,7 @@ "topics": [], "visibility": "public", "forks": 58, - "watchers": 147, + "watchers": 148, "score": 0, "subscribers_count": 1 }, diff --git a/2021/CVE-2021-35211.json b/2021/CVE-2021-35211.json index b83188077f..86e8ab4304 100644 --- a/2021/CVE-2021-35211.json +++ b/2021/CVE-2021-35211.json @@ -60,36 +60,5 @@ "watchers": 1, "score": 0, "subscribers_count": 2 - }, - { - "id": 447857478, - "name": "CVE-2021-35211", - "full_name": "BishopFox\/CVE-2021-35211", - "owner": { - "login": "BishopFox", - "id": 4523757, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4523757?v=4", - "html_url": "https:\/\/github.com\/BishopFox", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/BishopFox\/CVE-2021-35211", - "description": null, - "fork": false, - "created_at": "2022-01-14T05:52:17Z", - "updated_at": "2024-12-03T03:14:04Z", - "pushed_at": "2022-01-14T05:56:09Z", - "stargazers_count": 35, - "watchers_count": 35, - "has_discussions": false, - "forks_count": 9, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 9, - "watchers": 35, - "score": 0, - "subscribers_count": 4 } ] \ No newline at end of file diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json index 126e3d2c53..4cf6b75a72 100644 --- a/2021/CVE-2021-42278.json +++ b/2021/CVE-2021-42278.json @@ -14,10 +14,10 @@ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-11T15:10:30Z", - "updated_at": "2024-12-06T19:14:02Z", + "updated_at": "2024-12-08T09:34:30Z", "pushed_at": "2022-07-10T22:23:13Z", - "stargazers_count": 989, - "watchers_count": 989, + "stargazers_count": 990, + "watchers_count": 990, "has_discussions": false, "forks_count": 190, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 190, - "watchers": 989, + "watchers": 990, "score": 0, "subscribers_count": 24 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 4a0f9e5198..3e58d93dc2 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -107,10 +107,10 @@ "description": "Remote Code Injection In Log4j", "fork": false, "created_at": "2021-12-10T05:23:44Z", - "updated_at": "2024-11-25T03:42:23Z", + "updated_at": "2024-12-08T07:27:57Z", "pushed_at": "2022-01-18T12:01:52Z", - "stargazers_count": 459, - "watchers_count": 459, + "stargazers_count": 460, + "watchers_count": 460, "has_discussions": false, "forks_count": 124, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 124, - "watchers": 459, + "watchers": 460, "score": 0, "subscribers_count": 8 }, diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index 91656d3eb8..d3b6430af3 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -14,10 +14,10 @@ "description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。", "fork": false, "created_at": "2022-05-31T07:44:01Z", - "updated_at": "2024-12-06T05:41:39Z", + "updated_at": "2024-12-08T11:14:01Z", "pushed_at": "2023-02-26T14:06:05Z", - "stargazers_count": 1174, - "watchers_count": 1174, + "stargazers_count": 1176, + "watchers_count": 1176, "has_discussions": true, "forks_count": 190, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 190, - "watchers": 1174, + "watchers": 1176, "score": 0, "subscribers_count": 19 }, diff --git a/2022/CVE-2022-32532.json b/2022/CVE-2022-32532.json index 251c1a168b..841865a645 100644 --- a/2022/CVE-2022-32532.json +++ b/2022/CVE-2022-32532.json @@ -14,10 +14,10 @@ "description": "Apache Shiro CVE-2022-32532", "fork": false, "created_at": "2022-06-29T01:05:33Z", - "updated_at": "2024-09-04T08:17:13Z", + "updated_at": "2024-12-08T06:41:12Z", "pushed_at": "2022-06-28T22:46:43Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 12, + "watchers_count": 12, "has_discussions": false, "forks_count": 27, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 27, - "watchers": 11, + "watchers": 12, "score": 0, "subscribers_count": 0 } diff --git a/2022/CVE-2022-44268.json b/2022/CVE-2022-44268.json index 66f05de009..5cf0cf19ff 100644 --- a/2022/CVE-2022-44268.json +++ b/2022/CVE-2022-44268.json @@ -203,10 +203,10 @@ "description": "A PoC for the CVE-2022-44268 - ImageMagick arbitrary file read", "fork": false, "created_at": "2023-02-05T18:42:27Z", - "updated_at": "2024-12-05T09:17:47Z", + "updated_at": "2024-12-08T11:46:06Z", "pushed_at": "2023-02-05T19:35:03Z", - "stargazers_count": 216, - "watchers_count": 216, + "stargazers_count": 215, + "watchers_count": 215, "has_discussions": false, "forks_count": 25, "allow_forking": true, @@ -215,7 +215,7 @@ "topics": [], "visibility": "public", "forks": 25, - "watchers": 216, + "watchers": 215, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-23397.json b/2023/CVE-2023-23397.json index 672cdb4406..c5739658c7 100644 --- a/2023/CVE-2023-23397.json +++ b/2023/CVE-2023-23397.json @@ -584,10 +584,10 @@ "description": "An exploitation demo of Outlook Elevation of Privilege Vulnerability", "fork": false, "created_at": "2023-03-24T19:47:42Z", - "updated_at": "2023-03-24T19:47:42Z", + "updated_at": "2024-12-08T08:26:48Z", "pushed_at": "2023-03-24T19:51:39Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -596,7 +596,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-34312.json b/2023/CVE-2023-34312.json index e39e4e576a..19e6f65c3e 100644 --- a/2023/CVE-2023-34312.json +++ b/2023/CVE-2023-34312.json @@ -19,13 +19,13 @@ "stargazers_count": 420, "watchers_count": 420, "has_discussions": false, - "forks_count": 76, + "forks_count": 75, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 76, + "forks": 75, "watchers": 420, "score": 0, "subscribers_count": 3 diff --git a/2024/CVE-2024-0044.json b/2024/CVE-2024-0044.json index 204c02bdee..df2bbaebc4 100644 --- a/2024/CVE-2024-0044.json +++ b/2024/CVE-2024-0044.json @@ -45,10 +45,10 @@ "description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13", "fork": false, "created_at": "2024-06-18T12:30:53Z", - "updated_at": "2024-12-04T15:02:41Z", + "updated_at": "2024-12-08T09:14:20Z", "pushed_at": "2024-12-02T06:29:52Z", - "stargazers_count": 263, - "watchers_count": 263, + "stargazers_count": 264, + "watchers_count": 264, "has_discussions": false, "forks_count": 60, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 60, - "watchers": 263, + "watchers": 264, "score": 0, "subscribers_count": 7 }, @@ -297,19 +297,19 @@ "description": "PoC and writeup for bypassing the initial patch of CVE-2024-0044, Android run-as any app vulnerability allowing privilege escalation from adb to installed app", "fork": false, "created_at": "2024-09-27T09:02:08Z", - "updated_at": "2024-12-08T01:02:18Z", + "updated_at": "2024-12-08T07:08:32Z", "pushed_at": "2024-09-30T12:48:08Z", - "stargazers_count": 122, - "watchers_count": 122, + "stargazers_count": 123, + "watchers_count": 123, "has_discussions": false, - "forks_count": 16, + "forks_count": 17, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 16, - "watchers": 122, + "forks": 17, + "watchers": 123, "score": 0, "subscribers_count": 3 } diff --git a/2024/CVE-2024-1212.json b/2024/CVE-2024-1212.json index 286f55aca3..b1dc6a2e97 100644 --- a/2024/CVE-2024-1212.json +++ b/2024/CVE-2024-1212.json @@ -19,13 +19,13 @@ "stargazers_count": 15, "watchers_count": 15, "has_discussions": false, - "forks_count": 4, + "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 4, + "forks": 5, "watchers": 15, "score": 0, "subscribers_count": 2 diff --git a/2024/CVE-2024-21413.json b/2024/CVE-2024-21413.json index 710b2d83c2..e8f4c97d3d 100644 --- a/2024/CVE-2024-21413.json +++ b/2024/CVE-2024-21413.json @@ -45,10 +45,10 @@ "description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability", "fork": false, "created_at": "2024-02-16T15:17:59Z", - "updated_at": "2024-12-06T23:45:26Z", + "updated_at": "2024-12-08T11:39:29Z", "pushed_at": "2024-02-19T20:00:35Z", - "stargazers_count": 705, - "watchers_count": 705, + "stargazers_count": 706, + "watchers_count": 706, "has_discussions": false, "forks_count": 153, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 153, - "watchers": 705, + "watchers": 706, "score": 0, "subscribers_count": 10 }, diff --git a/2024/CVE-2024-23897.json b/2024/CVE-2024-23897.json index e59e0bf42c..28f5b5a8cd 100644 --- a/2024/CVE-2024-23897.json +++ b/2024/CVE-2024-23897.json @@ -1035,5 +1035,45 @@ "watchers": 7, "score": 0, "subscribers_count": 1 + }, + { + "id": 900230397, + "name": "CVE-2024-23897-Vulnerabilidad-Jenkins", + "full_name": "D1se0\/CVE-2024-23897-Vulnerabilidad-Jenkins", + "owner": { + "login": "D1se0", + "id": 164921056, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164921056?v=4", + "html_url": "https:\/\/github.com\/D1se0", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/D1se0\/CVE-2024-23897-Vulnerabilidad-Jenkins", + "description": null, + "fork": false, + "created_at": "2024-12-08T08:13:34Z", + "updated_at": "2024-12-08T08:46:39Z", + "pushed_at": "2024-12-08T08:46:36Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "auto-mount", + "cve-2024-23897", + "docker", + "docker-container", + "ethical-hacking", + "hacking", + "jenkins", + "laboratory" + ], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-32002.json b/2024/CVE-2024-32002.json index 52c617561d..68b6ae2a32 100644 --- a/2024/CVE-2024-32002.json +++ b/2024/CVE-2024-32002.json @@ -76,10 +76,10 @@ "description": "Exploit PoC for CVE-2024-32002", "fork": false, "created_at": "2024-05-17T19:33:08Z", - "updated_at": "2024-12-07T23:52:05Z", + "updated_at": "2024-12-08T06:37:07Z", "pushed_at": "2024-05-19T07:12:00Z", - "stargazers_count": 517, - "watchers_count": 517, + "stargazers_count": 518, + "watchers_count": 518, "has_discussions": false, "forks_count": 144, "allow_forking": true, @@ -93,7 +93,7 @@ ], "visibility": "public", "forks": 144, - "watchers": 517, + "watchers": 518, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-33352.json b/2024/CVE-2024-33352.json index 93755f402d..3343ecf72a 100644 --- a/2024/CVE-2024-33352.json +++ b/2024/CVE-2024-33352.json @@ -14,10 +14,10 @@ "description": "BlueStacks privilege escalation through VM backdooring", "fork": false, "created_at": "2024-07-16T07:38:19Z", - "updated_at": "2024-11-20T16:30:56Z", + "updated_at": "2024-12-08T12:11:30Z", "pushed_at": "2024-07-16T09:12:57Z", - "stargazers_count": 20, - "watchers_count": 20, + "stargazers_count": 19, + "watchers_count": 19, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -34,7 +34,7 @@ ], "visibility": "public", "forks": 3, - "watchers": 20, + "watchers": 19, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-42327.json b/2024/CVE-2024-42327.json index 32e4ab00c7..93b47c7c47 100644 --- a/2024/CVE-2024-42327.json +++ b/2024/CVE-2024-42327.json @@ -14,10 +14,10 @@ "description": "cve-2024-42327 ZBX-25623", "fork": false, "created_at": "2024-12-01T00:15:27Z", - "updated_at": "2024-12-07T14:42:28Z", + "updated_at": "2024-12-08T07:06:40Z", "pushed_at": "2024-12-01T01:18:36Z", - "stargazers_count": 22, - "watchers_count": 22, + "stargazers_count": 23, + "watchers_count": 23, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 11, - "watchers": 22, + "watchers": 23, "score": 0, "subscribers_count": 1 }, @@ -107,8 +107,8 @@ "description": "POC for CVE-2024-42327, an authenticated SQL Injection in Zabbix through the user.get API Method", "fork": false, "created_at": "2024-12-07T21:25:40Z", - "updated_at": "2024-12-07T21:57:08Z", - "pushed_at": "2024-12-07T21:57:04Z", + "updated_at": "2024-12-08T12:27:57Z", + "pushed_at": "2024-12-08T12:27:53Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2024/CVE-2024-48336.json b/2024/CVE-2024-48336.json index 4b152802bd..94ae414f93 100644 --- a/2024/CVE-2024-48336.json +++ b/2024/CVE-2024-48336.json @@ -14,19 +14,19 @@ "description": "Exploit and writeup for installed app to root privilege escalation through CVE-2024-48336 (Magisk Bug #8279), Privileges Escalation \/ Arbitrary Code Execution Vulnerability", "fork": false, "created_at": "2024-08-24T08:51:08Z", - "updated_at": "2024-12-02T09:32:30Z", + "updated_at": "2024-12-08T07:09:11Z", "pushed_at": "2024-11-05T02:57:25Z", - "stargazers_count": 176, - "watchers_count": 176, + "stargazers_count": 177, + "watchers_count": 177, "has_discussions": false, - "forks_count": 29, + "forks_count": 30, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 29, - "watchers": 176, + "forks": 30, + "watchers": 177, "score": 0, "subscribers_count": 8 } diff --git a/2024/CVE-2024-54679.json b/2024/CVE-2024-54679.json index c25489ac59..66177cfe8b 100644 --- a/2024/CVE-2024-54679.json +++ b/2024/CVE-2024-54679.json @@ -14,10 +14,10 @@ "description": "CVE-2024-54679 - CyberPanel (aka Cyber Panel) Denial of Service (https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-54679)", "fork": false, "created_at": "2024-12-06T06:02:34Z", - "updated_at": "2024-12-07T22:40:31Z", + "updated_at": "2024-12-08T09:23:19Z", "pushed_at": "2024-12-06T06:19:42Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-6387.json b/2024/CVE-2024-6387.json index ca5575985d..2bf5e1d224 100644 --- a/2024/CVE-2024-6387.json +++ b/2024/CVE-2024-6387.json @@ -2211,10 +2211,10 @@ "description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)", "fork": false, "created_at": "2024-07-08T11:27:49Z", - "updated_at": "2024-12-08T05:38:03Z", + "updated_at": "2024-12-08T08:25:24Z", "pushed_at": "2024-08-22T08:50:25Z", - "stargazers_count": 56, - "watchers_count": 56, + "stargazers_count": 57, + "watchers_count": 57, "has_discussions": false, "forks_count": 23, "allow_forking": true, @@ -2223,7 +2223,7 @@ "topics": [], "visibility": "public", "forks": 23, - "watchers": 56, + "watchers": 57, "score": 0, "subscribers_count": 2 }, diff --git a/README.md b/README.md index c85cac4a65..8979fbf7ce 100644 --- a/README.md +++ b/README.md @@ -3151,6 +3151,7 @@ - [BinaryGoodBoy0101/Jenkins-Exploit-CVE-2024-23897-Fsociety](https://github.com/BinaryGoodBoy0101/Jenkins-Exploit-CVE-2024-23897-Fsociety) - [ShieldAuth-PHP/PBL05-CVE-Analsys](https://github.com/ShieldAuth-PHP/PBL05-CVE-Analsys) - [verylazytech/CVE-2024-23897](https://github.com/verylazytech/CVE-2024-23897) +- [D1se0/CVE-2024-23897-Vulnerabilidad-Jenkins](https://github.com/D1se0/CVE-2024-23897-Vulnerabilidad-Jenkins) ### CVE-2024-23995 (2024-04-29) @@ -24555,6 +24556,7 @@ - [M507/CVE-2021-23017-PoC](https://github.com/M507/CVE-2021-23017-PoC) - [lakshit1212/CVE-2021-23017-PoC](https://github.com/lakshit1212/CVE-2021-23017-PoC) - [ShivamDey/CVE-2021-23017](https://github.com/ShivamDey/CVE-2021-23017) +- [z3usx01/CVE-2021-23017-POC](https://github.com/z3usx01/CVE-2021-23017-POC) ### CVE-2021-23132 (2021-03-04) @@ -26343,7 +26345,6 @@ - [NattiSamson/Serv-U-CVE-2021-35211](https://github.com/NattiSamson/Serv-U-CVE-2021-35211) - [0xhaggis/CVE-2021-35211](https://github.com/0xhaggis/CVE-2021-35211) -- [BishopFox/CVE-2021-35211](https://github.com/BishopFox/CVE-2021-35211) ### CVE-2021-35215 (2021-09-01)