diff --git a/2011/CVE-2011-2523.json b/2011/CVE-2011-2523.json index 5c587038bb..dbb78b1116 100644 --- a/2011/CVE-2011-2523.json +++ b/2011/CVE-2011-2523.json @@ -295,7 +295,7 @@ "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, - "forks_count": 2, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -310,7 +310,7 @@ "vsftpd-exploit" ], "visibility": "public", - "forks": 2, + "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 1 diff --git a/2011/CVE-2011-4919.json b/2011/CVE-2011-4919.json index cf0c286d59..2d08240d20 100644 --- a/2011/CVE-2011-4919.json +++ b/2011/CVE-2011-4919.json @@ -13,10 +13,10 @@ "description": ":unlock: CVE-2011-4919 -- mpack information disclosure demo (C)", "fork": false, "created_at": "2015-02-01T00:26:07Z", - "updated_at": "2016-09-05T04:27:12Z", + "updated_at": "2024-05-16T04:34:27Z", "pushed_at": "2015-02-01T00:27:48Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 3 } diff --git a/2016/CVE-2016-5195.json b/2016/CVE-2016-5195.json index ad2f7373b5..dd1a4e866c 100644 --- a/2016/CVE-2016-5195.json +++ b/2016/CVE-2016-5195.json @@ -601,10 +601,10 @@ "description": "CVE-2016-5195 (Dirty COW) PoC for Android 6.0.1 Marshmallow", "fork": false, "created_at": "2017-01-20T05:28:04Z", - "updated_at": "2024-05-13T09:30:40Z", + "updated_at": "2024-05-16T01:55:09Z", "pushed_at": "2017-01-27T10:04:07Z", - "stargazers_count": 261, - "watchers_count": 261, + "stargazers_count": 262, + "watchers_count": 262, "has_discussions": false, "forks_count": 98, "allow_forking": true, @@ -613,7 +613,7 @@ "topics": [], "visibility": "public", "forks": 98, - "watchers": 261, + "watchers": 262, "score": 0, "subscribers_count": 23 }, diff --git a/2017/CVE-2017-11882.json b/2017/CVE-2017-11882.json index 68cfd62c07..748b376a59 100644 --- a/2017/CVE-2017-11882.json +++ b/2017/CVE-2017-11882.json @@ -650,10 +650,10 @@ "description": "CVE-2017-11882(通杀Office 2003到2016)", "fork": false, "created_at": "2019-08-14T11:55:00Z", - "updated_at": "2023-09-28T11:05:07Z", + "updated_at": "2024-05-16T03:00:14Z", "pushed_at": "2020-12-22T07:23:03Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -662,7 +662,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 1 }, diff --git a/2017/CVE-2017-12615.json b/2017/CVE-2017-12615.json index 5f846f3a8f..e2884f510f 100644 --- a/2017/CVE-2017-12615.json +++ b/2017/CVE-2017-12615.json @@ -343,10 +343,10 @@ "description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含", "fork": false, "created_at": "2022-11-13T11:01:41Z", - "updated_at": "2024-05-15T06:25:53Z", + "updated_at": "2024-05-16T02:37:48Z", "pushed_at": "2022-11-15T09:05:50Z", - "stargazers_count": 146, - "watchers_count": 146, + "stargazers_count": 147, + "watchers_count": 147, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -355,7 +355,7 @@ "topics": [], "visibility": "public", "forks": 16, - "watchers": 146, + "watchers": 147, "score": 0, "subscribers_count": 4 }, diff --git a/2017/CVE-2017-15361.json b/2017/CVE-2017-15361.json index f1f15b9609..d4273afd26 100644 --- a/2017/CVE-2017-15361.json +++ b/2017/CVE-2017-15361.json @@ -73,10 +73,10 @@ "description": "Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber", "fork": false, "created_at": "2017-10-19T20:02:56Z", - "updated_at": "2024-04-25T06:46:25Z", + "updated_at": "2024-05-16T06:02:15Z", "pushed_at": "2018-09-04T21:35:36Z", - "stargazers_count": 47, - "watchers_count": 47, + "stargazers_count": 48, + "watchers_count": 48, "has_discussions": false, "forks_count": 26, "allow_forking": true, @@ -93,7 +93,7 @@ ], "visibility": "public", "forks": 26, - "watchers": 47, + "watchers": 48, "score": 0, "subscribers_count": 15 }, diff --git a/2018/CVE-2018-25031.json b/2018/CVE-2018-25031.json index ae14f38aa0..0713e349e2 100644 --- a/2018/CVE-2018-25031.json +++ b/2018/CVE-2018-25031.json @@ -280,11 +280,11 @@ "html_url": "https:\/\/github.com\/geozin" }, "html_url": "https:\/\/github.com\/geozin\/POC-CVE-2018-25031", - "description": null, + "description": "A simple POC (CVE-2018-25031", "fork": false, "created_at": "2024-05-15T23:21:58Z", - "updated_at": "2024-05-15T23:25:19Z", - "pushed_at": "2024-05-15T23:25:16Z", + "updated_at": "2024-05-16T02:16:36Z", + "pushed_at": "2024-05-16T02:16:33Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2019/CVE-2019-11061.json b/2019/CVE-2019-11061.json index ff89c57bc1..ab8310be6c 100644 --- a/2019/CVE-2019-11061.json +++ b/2019/CVE-2019-11061.json @@ -13,7 +13,7 @@ "description": "ASUS SmartHome Exploit for CVE-2019-11061 and CVE-2019-11063", "fork": false, "created_at": "2019-03-29T06:01:49Z", - "updated_at": "2024-03-10T20:25:06Z", + "updated_at": "2024-05-16T02:37:56Z", "pushed_at": "2019-08-27T04:23:24Z", "stargazers_count": 24, "watchers_count": 24, diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 0bc264fa93..fb7ebe841a 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -43,10 +43,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2024-05-15T12:06:14Z", + "updated_at": "2024-05-16T03:50:20Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 4030, - "watchers_count": 4030, + "stargazers_count": 4032, + "watchers_count": 4032, "has_discussions": false, "forks_count": 1080, "allow_forking": true, @@ -75,7 +75,7 @@ ], "visibility": "public", "forks": 1080, - "watchers": 4030, + "watchers": 4032, "score": 0, "subscribers_count": 151 }, diff --git a/2020/CVE-2020-0787.json b/2020/CVE-2020-0787.json index 639a5d8046..4e40dee0e5 100644 --- a/2020/CVE-2020-0787.json +++ b/2020/CVE-2020-0787.json @@ -13,10 +13,10 @@ "description": "Support ALL Windows Version", "fork": false, "created_at": "2020-06-16T08:57:51Z", - "updated_at": "2024-05-13T06:41:55Z", + "updated_at": "2024-05-16T01:41:10Z", "pushed_at": "2020-09-11T07:38:22Z", - "stargazers_count": 716, - "watchers_count": 716, + "stargazers_count": 717, + "watchers_count": 717, "has_discussions": false, "forks_count": 176, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 176, - "watchers": 716, + "watchers": 717, "score": 0, "subscribers_count": 19 }, diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 268b396282..8d477df05d 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -133,10 +133,10 @@ "description": "Scanner for CVE-2020-0796 - SMBv3 RCE", "fork": false, "created_at": "2020-03-11T15:21:27Z", - "updated_at": "2024-05-15T10:21:42Z", + "updated_at": "2024-05-16T02:28:13Z", "pushed_at": "2020-10-01T08:36:29Z", - "stargazers_count": 652, - "watchers_count": 652, + "stargazers_count": 653, + "watchers_count": 653, "has_discussions": false, "forks_count": 198, "allow_forking": true, @@ -147,7 +147,7 @@ ], "visibility": "public", "forks": 198, - "watchers": 652, + "watchers": 653, "score": 0, "subscribers_count": 26 }, diff --git a/2020/CVE-2020-1362.json b/2020/CVE-2020-1362.json index 0c4571a31b..83c16f70b8 100644 --- a/2020/CVE-2020-1362.json +++ b/2020/CVE-2020-1362.json @@ -13,10 +13,10 @@ "description": "writeup of CVE-2020-1362", "fork": false, "created_at": "2020-07-17T07:35:05Z", - "updated_at": "2024-03-14T10:53:30Z", + "updated_at": "2024-05-16T03:19:34Z", "pushed_at": "2020-07-17T07:54:26Z", - "stargazers_count": 231, - "watchers_count": 231, + "stargazers_count": 232, + "watchers_count": 232, "has_discussions": false, "forks_count": 45, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 45, - "watchers": 231, + "watchers": 232, "score": 0, "subscribers_count": 12 } diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index be438b7a2a..cbd098f4a4 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,10 +13,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2024-05-15T12:06:14Z", + "updated_at": "2024-05-16T03:50:20Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 4030, - "watchers_count": 4030, + "stargazers_count": 4032, + "watchers_count": 4032, "has_discussions": false, "forks_count": 1080, "allow_forking": true, @@ -45,7 +45,7 @@ ], "visibility": "public", "forks": 1080, - "watchers": 4030, + "watchers": 4032, "score": 0, "subscribers_count": 151 }, diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index 64bccafe6d..ed261fd854 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -889,10 +889,10 @@ "description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含", "fork": false, "created_at": "2022-11-13T11:01:41Z", - "updated_at": "2024-05-15T06:25:53Z", + "updated_at": "2024-05-16T02:37:48Z", "pushed_at": "2022-11-15T09:05:50Z", - "stargazers_count": 146, - "watchers_count": 146, + "stargazers_count": 147, + "watchers_count": 147, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -901,7 +901,7 @@ "topics": [], "visibility": "public", "forks": 16, - "watchers": 146, + "watchers": 147, "score": 0, "subscribers_count": 4 }, diff --git a/2020/CVE-2020-4463.json b/2020/CVE-2020-4463.json index e9bff4e962..805aba07ce 100644 --- a/2020/CVE-2020-4463.json +++ b/2020/CVE-2020-4463.json @@ -13,10 +13,10 @@ "description": "IBM Maximo Asset Management is vulnerable to Information Disclosure via XXE Vulnerability (CVE-2020-4463)", "fork": false, "created_at": "2020-08-13T09:03:40Z", - "updated_at": "2023-12-28T12:31:34Z", + "updated_at": "2024-05-16T03:55:38Z", "pushed_at": "2023-09-19T10:38:28Z", - "stargazers_count": 48, - "watchers_count": 48, + "stargazers_count": 49, + "watchers_count": 49, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 16, - "watchers": 48, + "watchers": 49, "score": 0, "subscribers_count": 2 } diff --git a/2021/CVE-2021-1732.json b/2021/CVE-2021-1732.json index a04bfeb010..c7b456ffca 100644 --- a/2021/CVE-2021-1732.json +++ b/2021/CVE-2021-1732.json @@ -163,10 +163,10 @@ "description": "Read my blog for more info - ", "fork": false, "created_at": "2021-04-25T12:55:15Z", - "updated_at": "2024-02-24T11:42:31Z", + "updated_at": "2024-05-16T02:44:41Z", "pushed_at": "2021-04-27T21:13:18Z", - "stargazers_count": 31, - "watchers_count": 31, + "stargazers_count": 32, + "watchers_count": 32, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -175,7 +175,7 @@ "topics": [], "visibility": "public", "forks": 16, - "watchers": 31, + "watchers": 32, "score": 0, "subscribers_count": 2 }, diff --git a/2021/CVE-2021-21985.json b/2021/CVE-2021-21985.json index c043f7a175..fb6c81ec59 100644 --- a/2021/CVE-2021-21985.json +++ b/2021/CVE-2021-21985.json @@ -145,13 +145,13 @@ "stargazers_count": 113, "watchers_count": 113, "has_discussions": false, - "forks_count": 38, + "forks_count": 37, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 38, + "forks": 37, "watchers": 113, "score": 0, "subscribers_count": 4 diff --git a/2021/CVE-2021-35215.json b/2021/CVE-2021-35215.json index cbeaf3cab7..a95887157c 100644 --- a/2021/CVE-2021-35215.json +++ b/2021/CVE-2021-35215.json @@ -13,10 +13,10 @@ "description": "SolarWinds Orion Platform ActionPluginBaseView 反序列化RCE", "fork": false, "created_at": "2021-10-23T01:35:42Z", - "updated_at": "2023-03-13T15:26:35Z", + "updated_at": "2024-05-16T01:48:37Z", "pushed_at": "2021-10-23T01:44:54Z", - "stargazers_count": 47, - "watchers_count": 47, + "stargazers_count": 48, + "watchers_count": 48, "has_discussions": false, "forks_count": 10, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 10, - "watchers": 47, + "watchers": 48, "score": 0, "subscribers_count": 2 } diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 14ca7d0fd8..695f4a1108 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -7073,7 +7073,7 @@ "fork": false, "created_at": "2021-12-15T21:09:00Z", "updated_at": "2023-06-22T04:46:02Z", - "pushed_at": "2024-05-10T00:48:45Z", + "pushed_at": "2024-05-16T00:52:42Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, diff --git a/2022/CVE-2022-22274.json b/2022/CVE-2022-22274.json index 40b7317429..21fa78223c 100644 --- a/2022/CVE-2022-22274.json +++ b/2022/CVE-2022-22274.json @@ -73,10 +73,10 @@ "description": null, "fork": false, "created_at": "2024-01-12T20:03:51Z", - "updated_at": "2024-04-25T14:05:16Z", + "updated_at": "2024-05-16T05:49:05Z", "pushed_at": "2024-01-12T20:15:47Z", - "stargazers_count": 16, - "watchers_count": 16, + "stargazers_count": 17, + "watchers_count": 17, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 16, + "watchers": 17, "score": 0, "subscribers_count": 5 } diff --git a/2022/CVE-2022-29072.json b/2022/CVE-2022-29072.json index b4e39390de..d319f550a2 100644 --- a/2022/CVE-2022-29072.json +++ b/2022/CVE-2022-29072.json @@ -91,7 +91,7 @@ "forks": 0, "watchers": 9, "score": 0, - "subscribers_count": 3 + "subscribers_count": 2 }, { "id": 580447745, diff --git a/2022/CVE-2022-30190.json b/2022/CVE-2022-30190.json index 4a2e5f1a15..0bb518ff90 100644 --- a/2022/CVE-2022-30190.json +++ b/2022/CVE-2022-30190.json @@ -311,7 +311,7 @@ "forks": 1, "watchers": 5, "score": 0, - "subscribers_count": 4 + "subscribers_count": 3 }, { "id": 498457928, diff --git a/2022/CVE-2022-36804.json b/2022/CVE-2022-36804.json index af6ea49e08..20bb87383c 100644 --- a/2022/CVE-2022-36804.json +++ b/2022/CVE-2022-36804.json @@ -48,13 +48,13 @@ "stargazers_count": 18, "watchers_count": 18, "has_discussions": false, - "forks_count": 10, + "forks_count": 8, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 10, + "forks": 8, "watchers": 18, "score": 0, "subscribers_count": 1 diff --git a/2023/CVE-2023-0656.json b/2023/CVE-2023-0656.json index 714fca3255..eed45b2ce1 100644 --- a/2023/CVE-2023-0656.json +++ b/2023/CVE-2023-0656.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2024-01-12T20:03:51Z", - "updated_at": "2024-04-25T14:05:16Z", + "updated_at": "2024-05-16T05:49:05Z", "pushed_at": "2024-01-12T20:15:47Z", - "stargazers_count": 16, - "watchers_count": 16, + "stargazers_count": 17, + "watchers_count": 17, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 16, + "watchers": 17, "score": 0, "subscribers_count": 5 } diff --git a/2023/CVE-2023-21768.json b/2023/CVE-2023-21768.json index b979e86cf4..c5a24cdd7f 100644 --- a/2023/CVE-2023-21768.json +++ b/2023/CVE-2023-21768.json @@ -27,7 +27,7 @@ "forks": 164, "watchers": 468, "score": 0, - "subscribers_count": 9 + "subscribers_count": 10 }, { "id": 612032133, @@ -335,6 +335,6 @@ "forks": 0, "watchers": 3, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-22527.json b/2023/CVE-2023-22527.json index 9d0154bc04..9962fb338f 100644 --- a/2023/CVE-2023-22527.json +++ b/2023/CVE-2023-22527.json @@ -586,10 +586,10 @@ "description": "confluence CVE-2023-22527 漏洞利用工具,支持冰蝎\/哥斯拉内存马注入,支持设置 http 代理", "fork": false, "created_at": "2024-02-26T02:34:44Z", - "updated_at": "2024-05-15T15:06:47Z", + "updated_at": "2024-05-16T05:02:11Z", "pushed_at": "2024-04-24T02:34:16Z", - "stargazers_count": 19, - "watchers_count": 19, + "stargazers_count": 20, + "watchers_count": 20, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -598,7 +598,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 19, + "watchers": 20, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-22960.json b/2023/CVE-2023-22960.json index 6d49a7f58e..34c437c77a 100644 --- a/2023/CVE-2023-22960.json +++ b/2023/CVE-2023-22960.json @@ -13,10 +13,10 @@ "description": "This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) of more than 60 Lexmark printer models. This issue affects both username-password and PIN authentication.", "fork": false, "created_at": "2023-01-24T08:33:19Z", - "updated_at": "2024-05-10T18:04:20Z", + "updated_at": "2024-05-16T06:02:25Z", "pushed_at": "2023-06-15T14:38:07Z", - "stargazers_count": 81, - "watchers_count": 81, + "stargazers_count": 82, + "watchers_count": 82, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 16, - "watchers": 81, + "watchers": 82, "score": 0, "subscribers_count": 2 } diff --git a/2023/CVE-2023-24055.json b/2023/CVE-2023-24055.json index 28341727d8..0b6f8b49da 100644 --- a/2023/CVE-2023-24055.json +++ b/2023/CVE-2023-24055.json @@ -57,7 +57,7 @@ "forks": 38, "watchers": 254, "score": 0, - "subscribers_count": 8 + "subscribers_count": 7 }, { "id": 594744538, diff --git a/2023/CVE-2023-3076.json b/2023/CVE-2023-3076.json index 7c463a631a..ce8d856b73 100644 --- a/2023/CVE-2023-3076.json +++ b/2023/CVE-2023-3076.json @@ -13,10 +13,10 @@ "description": "Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (Mass Add Admin + PHP File Upload)", "fork": false, "created_at": "2023-09-19T04:59:01Z", - "updated_at": "2024-05-15T06:21:53Z", + "updated_at": "2024-05-16T01:40:28Z", "pushed_at": "2023-09-20T11:41:02Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 13, + "watchers_count": 13, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -36,7 +36,7 @@ ], "visibility": "public", "forks": 2, - "watchers": 12, + "watchers": 13, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-32315.json b/2023/CVE-2023-32315.json index 5480035699..a695468348 100644 --- a/2023/CVE-2023-32315.json +++ b/2023/CVE-2023-32315.json @@ -43,10 +43,10 @@ "description": "rce", "fork": false, "created_at": "2023-06-14T09:43:31Z", - "updated_at": "2024-05-14T01:54:12Z", + "updated_at": "2024-05-16T02:06:22Z", "pushed_at": "2023-06-15T01:35:51Z", - "stargazers_count": 124, - "watchers_count": 124, + "stargazers_count": 125, + "watchers_count": 125, "has_discussions": false, "forks_count": 30, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 30, - "watchers": 124, + "watchers": 125, "score": 0, "subscribers_count": 5 }, diff --git a/2023/CVE-2023-34845.json b/2023/CVE-2023-34845.json index c3b3fc682f..2989baae51 100644 --- a/2023/CVE-2023-34845.json +++ b/2023/CVE-2023-34845.json @@ -13,10 +13,10 @@ "description": "Vulnerability POC for CVE-2023-34845", "fork": false, "created_at": "2024-03-03T10:50:16Z", - "updated_at": "2024-03-03T10:50:17Z", + "updated_at": "2024-05-16T06:07:14Z", "pushed_at": "2024-03-03T10:51:12Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-36802.json b/2023/CVE-2023-36802.json index ff8cd45398..73dadf58fa 100644 --- a/2023/CVE-2023-36802.json +++ b/2023/CVE-2023-36802.json @@ -103,10 +103,10 @@ "description": "Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver", "fork": false, "created_at": "2023-10-23T18:33:41Z", - "updated_at": "2024-05-10T10:51:53Z", + "updated_at": "2024-05-16T05:36:34Z", "pushed_at": "2023-10-26T11:44:46Z", - "stargazers_count": 101, - "watchers_count": 101, + "stargazers_count": 102, + "watchers_count": 102, "has_discussions": false, "forks_count": 25, "allow_forking": true, @@ -115,7 +115,7 @@ "topics": [], "visibility": "public", "forks": 25, - "watchers": 101, + "watchers": 102, "score": 0, "subscribers_count": 3 } diff --git a/2023/CVE-2023-41993.json b/2023/CVE-2023-41993.json index 87b88bc01d..83f39b24af 100644 --- a/2023/CVE-2023-41993.json +++ b/2023/CVE-2023-41993.json @@ -27,7 +27,7 @@ "forks": 34, "watchers": 184, "score": 0, - "subscribers_count": 9 + "subscribers_count": 10 }, { "id": 705738898, diff --git a/2023/CVE-2023-43284.json b/2023/CVE-2023-43284.json index 25401e7477..a4b72037d5 100644 --- a/2023/CVE-2023-43284.json +++ b/2023/CVE-2023-43284.json @@ -13,7 +13,7 @@ "description": "DLink DIR-846 Authenticated Remote Code Execution", "fork": false, "created_at": "2023-10-04T13:07:37Z", - "updated_at": "2023-12-03T18:01:47Z", + "updated_at": "2024-05-16T03:37:47Z", "pushed_at": "2023-10-04T13:31:59Z", "stargazers_count": 18, "watchers_count": 18, diff --git a/2023/CVE-2023-44976.json b/2023/CVE-2023-44976.json index ed038f45e3..58bb076f25 100644 --- a/2023/CVE-2023-44976.json +++ b/2023/CVE-2023-44976.json @@ -13,10 +13,10 @@ "description": "A vulnerable driver exploited by me (BYOVD) that is capable of terminating several EDRs and antivirus software in the market, rendering them ineffective, working for both x32 and x64(CVE-2023-44976).", "fork": false, "created_at": "2023-10-01T18:24:38Z", - "updated_at": "2024-05-15T06:21:53Z", + "updated_at": "2024-05-16T02:02:19Z", "pushed_at": "2024-01-27T01:35:24Z", - "stargazers_count": 46, - "watchers_count": 46, + "stargazers_count": 47, + "watchers_count": 47, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 11, - "watchers": 46, + "watchers": 47, "score": 0, "subscribers_count": 2 } diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index 60583bf498..92997f58c4 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -13,10 +13,10 @@ "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "fork": false, "created_at": "2024-01-16T06:52:02Z", - "updated_at": "2024-05-16T00:11:18Z", - "pushed_at": "2024-05-16T00:10:31Z", - "stargazers_count": 646, - "watchers_count": 646, + "updated_at": "2024-05-16T06:16:04Z", + "pushed_at": "2024-05-16T05:05:18Z", + "stargazers_count": 651, + "watchers_count": 651, "has_discussions": false, "forks_count": 110, "allow_forking": true, @@ -25,9 +25,9 @@ "topics": [], "visibility": "public", "forks": 110, - "watchers": 646, + "watchers": 651, "score": 0, - "subscribers_count": 9 + "subscribers_count": 11 }, { "id": 743886715, diff --git a/2023/CVE-2023-46604.json b/2023/CVE-2023-46604.json index 6cb34ec517..8572413032 100644 --- a/2023/CVE-2023-46604.json +++ b/2023/CVE-2023-46604.json @@ -13,10 +13,10 @@ "description": "CVE-2023-46604", "fork": false, "created_at": "2023-10-26T03:25:05Z", - "updated_at": "2024-04-26T09:15:58Z", + "updated_at": "2024-05-16T02:37:15Z", "pushed_at": "2023-10-26T03:28:14Z", - "stargazers_count": 27, - "watchers_count": 27, + "stargazers_count": 28, + "watchers_count": 28, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 8, - "watchers": 27, + "watchers": 28, "score": 0, "subscribers_count": 1 }, @@ -73,10 +73,10 @@ "description": "CVE-2023-46604", "fork": false, "created_at": "2023-10-27T12:22:43Z", - "updated_at": "2024-04-25T09:10:50Z", + "updated_at": "2024-05-16T02:39:23Z", "pushed_at": "2023-11-03T14:14:31Z", - "stargazers_count": 50, - "watchers_count": 50, + "stargazers_count": 51, + "watchers_count": 51, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 50, + "watchers": 51, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-4863.json b/2023/CVE-2023-4863.json index 3caa012dc6..951016f6a8 100644 --- a/2023/CVE-2023-4863.json +++ b/2023/CVE-2023-4863.json @@ -13,19 +13,19 @@ "description": null, "fork": false, "created_at": "2023-09-21T05:22:51Z", - "updated_at": "2024-05-16T00:01:17Z", + "updated_at": "2024-05-16T05:03:07Z", "pushed_at": "2023-12-18T04:25:00Z", - "stargazers_count": 297, - "watchers_count": 297, + "stargazers_count": 298, + "watchers_count": 298, "has_discussions": false, - "forks_count": 46, + "forks_count": 47, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 46, - "watchers": 297, + "forks": 47, + "watchers": 298, "score": 0, "subscribers_count": 15 }, diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json index bf7d0252b8..1feeec6231 100644 --- a/2024/CVE-2024-1086.json +++ b/2024/CVE-2024-1086.json @@ -13,10 +13,10 @@ "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.", "fork": false, "created_at": "2024-03-20T21:16:41Z", - "updated_at": "2024-05-15T12:40:02Z", + "updated_at": "2024-05-16T04:41:36Z", "pushed_at": "2024-04-17T16:09:54Z", - "stargazers_count": 1926, - "watchers_count": 1926, + "stargazers_count": 1928, + "watchers_count": 1928, "has_discussions": false, "forks_count": 239, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 239, - "watchers": 1926, + "watchers": 1928, "score": 0, "subscribers_count": 21 }, diff --git a/2024/CVE-2024-21413.json b/2024/CVE-2024-21413.json index da3218b071..e5a4ffd7c8 100644 --- a/2024/CVE-2024-21413.json +++ b/2024/CVE-2024-21413.json @@ -48,13 +48,13 @@ "stargazers_count": 607, "watchers_count": 607, "has_discussions": false, - "forks_count": 134, + "forks_count": 135, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 134, + "forks": 135, "watchers": 607, "score": 0, "subscribers_count": 9 diff --git a/2024/CVE-2024-22026.json b/2024/CVE-2024-22026.json index 18ddc53422..84ce99d090 100644 --- a/2024/CVE-2024-22026.json +++ b/2024/CVE-2024-22026.json @@ -18,15 +18,15 @@ "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, - "forks_count": 0, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 2, "watchers": 1, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-22243.json b/2024/CVE-2024-22243.json index 40063d2111..e271c520b9 100644 --- a/2024/CVE-2024-22243.json +++ b/2024/CVE-2024-22243.json @@ -13,10 +13,10 @@ "description": " env of CVE-2024-22243&CVE-2024-22234", "fork": false, "created_at": "2024-02-23T10:09:51Z", - "updated_at": "2024-05-09T09:33:48Z", + "updated_at": "2024-05-16T01:31:27Z", "pushed_at": "2024-02-28T06:55:26Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 2 } diff --git a/2024/CVE-2024-23897.json b/2024/CVE-2024-23897.json index 3b17db0eca..2413fc5b7a 100644 --- a/2024/CVE-2024-23897.json +++ b/2024/CVE-2024-23897.json @@ -256,10 +256,10 @@ "description": "CVE-2024-23897 - Jenkins 任意文件读取 利用工具", "fork": false, "created_at": "2024-01-27T19:34:48Z", - "updated_at": "2024-05-11T04:13:03Z", + "updated_at": "2024-05-16T06:13:55Z", "pushed_at": "2024-03-16T07:55:41Z", - "stargazers_count": 54, - "watchers_count": 54, + "stargazers_count": 55, + "watchers_count": 55, "has_discussions": false, "forks_count": 10, "allow_forking": true, @@ -272,7 +272,7 @@ ], "visibility": "public", "forks": 10, - "watchers": 54, + "watchers": 55, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-27460.json b/2024/CVE-2024-27460.json index 8ee2bede06..2a6d5cf97f 100644 --- a/2024/CVE-2024-27460.json +++ b/2024/CVE-2024-27460.json @@ -13,21 +13,21 @@ "description": "Plantronics Desktop Hub LPE", "fork": false, "created_at": "2024-05-12T09:53:07Z", - "updated_at": "2024-05-15T16:16:49Z", + "updated_at": "2024-05-16T01:46:46Z", "pushed_at": "2024-05-15T15:12:59Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, - "watchers": 1, + "forks": 1, + "watchers": 3, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 }, { "id": 799923080, diff --git a/2024/CVE-2024-27804.json b/2024/CVE-2024-27804.json index bd9064a22b..6128191af7 100644 --- a/2024/CVE-2024-27804.json +++ b/2024/CVE-2024-27804.json @@ -13,10 +13,10 @@ "description": "POC for CVE-2024-27804", "fork": false, "created_at": "2024-05-14T14:17:06Z", - "updated_at": "2024-05-15T22:41:59Z", + "updated_at": "2024-05-16T05:39:51Z", "pushed_at": "2024-05-14T14:55:23Z", - "stargazers_count": 74, - "watchers_count": 74, + "stargazers_count": 78, + "watchers_count": 78, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 15, - "watchers": 74, + "watchers": 78, "score": 0, "subscribers_count": 2 } diff --git a/2024/CVE-2024-27956.json b/2024/CVE-2024-27956.json index 58b3633c3a..e120c2b63f 100644 --- a/2024/CVE-2024-27956.json +++ b/2024/CVE-2024-27956.json @@ -198,10 +198,10 @@ "description": "WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target server. It utilizes the wp-automatic plugin's CSV injection vulnerability to execute SQL queries", "fork": false, "created_at": "2024-05-14T14:21:49Z", - "updated_at": "2024-05-15T23:49:36Z", - "pushed_at": "2024-05-15T17:51:02Z", - "stargazers_count": 31, - "watchers_count": 31, + "updated_at": "2024-05-16T05:49:51Z", + "pushed_at": "2024-05-16T05:49:47Z", + "stargazers_count": 33, + "watchers_count": 33, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -230,7 +230,7 @@ ], "visibility": "public", "forks": 7, - "watchers": 31, + "watchers": 33, "score": 0, "subscribers_count": 1 }, @@ -262,6 +262,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-2879.json b/2024/CVE-2024-2879.json index 6c75eb323c..42f1349707 100644 --- a/2024/CVE-2024-2879.json +++ b/2024/CVE-2024-2879.json @@ -13,19 +13,19 @@ "description": "CVE-2024-2879 - LayerSlider 7.9.11 - 7.10.0 - Unauthenticated SQL Injection", "fork": false, "created_at": "2024-04-08T18:50:02Z", - "updated_at": "2024-05-15T06:22:07Z", + "updated_at": "2024-05-16T03:42:53Z", "pushed_at": "2024-04-08T19:16:28Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 12, + "watchers_count": 12, "has_discussions": false, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, - "watchers": 11, + "forks": 2, + "watchers": 12, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-29895.json b/2024/CVE-2024-29895.json index 5eaeff8438..6a69125887 100644 --- a/2024/CVE-2024-29895.json +++ b/2024/CVE-2024-29895.json @@ -13,10 +13,10 @@ "description": "CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds", "fork": false, "created_at": "2024-05-15T13:11:45Z", - "updated_at": "2024-05-15T21:46:06Z", + "updated_at": "2024-05-16T04:26:41Z", "pushed_at": "2024-05-15T21:40:25Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -34,7 +34,37 @@ ], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 3, + "score": 0, + "subscribers_count": 1 + }, + { + "id": 801392594, + "name": "CVE-2024-29895", + "full_name": "secunnix\/CVE-2024-29895", + "owner": { + "login": "secunnix", + "id": 104568161, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104568161?v=4", + "html_url": "https:\/\/github.com\/secunnix" + }, + "html_url": "https:\/\/github.com\/secunnix\/CVE-2024-29895", + "description": "Cacti CVE-2024-29895 POC", + "fork": false, + "created_at": "2024-05-16T06:29:21Z", + "updated_at": "2024-05-16T06:31:45Z", + "pushed_at": "2024-05-16T06:31:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-3094.json b/2024/CVE-2024-3094.json index 5370e69ca5..96d6afa847 100644 --- a/2024/CVE-2024-3094.json +++ b/2024/CVE-2024-3094.json @@ -1012,7 +1012,7 @@ "description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)", "fork": false, "created_at": "2024-04-01T14:28:09Z", - "updated_at": "2024-05-15T21:48:30Z", + "updated_at": "2024-05-16T03:54:18Z", "pushed_at": "2024-04-03T04:58:50Z", "stargazers_count": 3461, "watchers_count": 3461, diff --git a/2024/CVE-2024-32640.json b/2024/CVE-2024-32640.json new file mode 100644 index 0000000000..657bd78ec0 --- /dev/null +++ b/2024/CVE-2024-32640.json @@ -0,0 +1,43 @@ +[ + { + "id": 801300321, + "name": "CVE-2024-32640-SQLI-MuraCMS", + "full_name": "Stuub\/CVE-2024-32640-SQLI-MuraCMS", + "owner": { + "login": "Stuub", + "id": 60468836, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60468836?v=4", + "html_url": "https:\/\/github.com\/Stuub" + }, + "html_url": "https:\/\/github.com\/Stuub\/CVE-2024-32640-SQLI-MuraCMS", + "description": "CVE-2024-32640 | Automated SQLi PoC", + "fork": false, + "created_at": "2024-05-16T01:02:32Z", + "updated_at": "2024-05-16T01:20:01Z", + "pushed_at": "2024-05-16T01:18:25Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "0day", + "cve", + "cve-2024", + "cve-2024-32640", + "cve-2024-32640-poc", + "masacms", + "muracms", + "poc", + "rce", + "sqli" + ], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-3400.json b/2024/CVE-2024-3400.json index 1f1c719edf..04bc50b501 100644 --- a/2024/CVE-2024-3400.json +++ b/2024/CVE-2024-3400.json @@ -133,19 +133,19 @@ "description": null, "fork": false, "created_at": "2024-04-14T15:16:16Z", - "updated_at": "2024-05-15T17:03:10Z", + "updated_at": "2024-05-16T05:33:26Z", "pushed_at": "2024-04-14T15:20:34Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "has_discussions": false, - "forks_count": 3, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 3, - "watchers": 9, + "forks": 4, + "watchers": 10, "score": 0, "subscribers_count": 2 }, @@ -223,10 +223,10 @@ "description": "CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect", "fork": false, "created_at": "2024-04-16T01:43:24Z", - "updated_at": "2024-04-18T11:01:24Z", + "updated_at": "2024-05-16T04:15:21Z", "pushed_at": "2024-04-16T02:08:47Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -235,7 +235,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 5, + "watchers": 6, "score": 0, "subscribers_count": 1 }, @@ -1048,8 +1048,8 @@ "description": "Find rows contain specific IP addresses in large files and then, extract them. This tool make for investigating logs for cve-2024-3400", "fork": false, "created_at": "2024-05-15T15:50:32Z", - "updated_at": "2024-05-15T15:52:19Z", - "pushed_at": "2024-05-15T15:52:15Z", + "updated_at": "2024-05-16T00:52:11Z", + "pushed_at": "2024-05-16T00:52:08Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, @@ -1062,6 +1062,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/README.md b/README.md index dc9162b8a0..23f74709a2 100644 --- a/README.md +++ b/README.md @@ -1729,6 +1729,7 @@ - [Stuub/CVE-2024-29895-CactiRCE-PoC](https://github.com/Stuub/CVE-2024-29895-CactiRCE-PoC) +- [secunnix/CVE-2024-29895](https://github.com/secunnix/CVE-2024-29895) ### CVE-2024-29988 (2024-04-09) @@ -1898,6 +1899,9 @@ ### CVE-2024-32523 - [truonghuuphuc/CVE-2024-32523-Poc](https://github.com/truonghuuphuc/CVE-2024-32523-Poc) +### CVE-2024-32640 +- [Stuub/CVE-2024-32640-SQLI-MuraCMS](https://github.com/Stuub/CVE-2024-32640-SQLI-MuraCMS) + ### CVE-2024-32709 (2024-04-24) Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Plechev Andrey WP-Recall.This issue affects WP-Recall: from n/a through 16.26.5.\n\n