diff --git a/2003/CVE-2003-0001.json b/2003/CVE-2003-0001.json index f1b871e1fd..8319fdc2c5 100644 --- a/2003/CVE-2003-0001.json +++ b/2003/CVE-2003-0001.json @@ -14,10 +14,10 @@ "description": "This Python script helps to detect the Etherleak (CVE-2003-0001) vulnerability on a target host by analyzing the padding data in network packets. The script uses Scapy to send various types of requests (ICMP, ARP, or TCP) and checks if the responses contain any padding data that could potentially leak sensitive memory contents.", "fork": false, "created_at": "2024-10-01T14:03:30Z", - "updated_at": "2024-10-08T15:25:48Z", + "updated_at": "2024-12-09T09:32:10Z", "pushed_at": "2024-10-01T14:12:30Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 } diff --git a/2012/CVE-2012-1823.json b/2012/CVE-2012-1823.json index 8bc56c339e..1272b37361 100644 --- a/2012/CVE-2012-1823.json +++ b/2012/CVE-2012-1823.json @@ -153,5 +153,36 @@ "watchers": 9, "score": 0, "subscribers_count": 1 + }, + { + "id": 900659776, + "name": "CVE-2012-1823-Analyze", + "full_name": "Jimmy01240397\/CVE-2012-1823-Analyze", + "owner": { + "login": "Jimmy01240397", + "id": 57281249, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57281249?v=4", + "html_url": "https:\/\/github.com\/Jimmy01240397", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Jimmy01240397\/CVE-2012-1823-Analyze", + "description": null, + "fork": false, + "created_at": "2024-12-09T08:31:04Z", + "updated_at": "2024-12-09T08:32:04Z", + "pushed_at": "2024-12-09T08:32:00Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-12615.json b/2017/CVE-2017-12615.json index acceb59d0d..f8fe9ecf22 100644 --- a/2017/CVE-2017-12615.json +++ b/2017/CVE-2017-12615.json @@ -355,10 +355,10 @@ "description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含", "fork": false, "created_at": "2022-11-13T11:01:41Z", - "updated_at": "2024-12-09T00:56:39Z", + "updated_at": "2024-12-09T08:01:15Z", "pushed_at": "2022-11-15T09:05:50Z", - "stargazers_count": 205, - "watchers_count": 205, + "stargazers_count": 206, + "watchers_count": 206, "has_discussions": false, "forks_count": 18, "allow_forking": true, @@ -367,7 +367,7 @@ "topics": [], "visibility": "public", "forks": 18, - "watchers": 205, + "watchers": 206, "score": 0, "subscribers_count": 4 }, diff --git a/2019/CVE-2019-16098.json b/2019/CVE-2019-16098.json index 815d7801e0..3eabf5ae39 100644 --- a/2019/CVE-2019-16098.json +++ b/2019/CVE-2019-16098.json @@ -76,10 +76,10 @@ "description": "This exploit rebuilds and exploit the CVE-2019-16098 which is in driver Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCore32.sys) allows any authenticated user to read and write to arbitrary memory, I\/O ports, and MSRs. Instead of hardcoded base address of Ntoskrnl.exe, I calculated it dynamically and recalulated the fields offsets", "fork": false, "created_at": "2024-08-05T16:55:40Z", - "updated_at": "2024-11-21T05:20:35Z", + "updated_at": "2024-12-09T06:35:04Z", "pushed_at": "2024-08-05T18:31:16Z", - "stargazers_count": 13, - "watchers_count": 13, + "stargazers_count": 14, + "watchers_count": 14, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 13, + "watchers": 14, "score": 0, "subscribers_count": 1 } diff --git a/2019/CVE-2019-2215.json b/2019/CVE-2019-2215.json index 17e0f8595a..56354fcbff 100644 --- a/2019/CVE-2019-2215.json +++ b/2019/CVE-2019-2215.json @@ -76,10 +76,10 @@ "description": "Temproot for Pixel 2 and Pixel 2 XL via CVE-2019-2215", "fork": false, "created_at": "2019-10-14T17:27:37Z", - "updated_at": "2024-12-04T05:26:29Z", + "updated_at": "2024-12-09T09:14:21Z", "pushed_at": "2019-10-15T01:04:08Z", - "stargazers_count": 110, - "watchers_count": 110, + "stargazers_count": 111, + "watchers_count": 111, "has_discussions": false, "forks_count": 48, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 48, - "watchers": 110, + "watchers": 111, "score": 0, "subscribers_count": 9 }, diff --git a/2019/CVE-2019-3396.json b/2019/CVE-2019-3396.json index 1ef023b8a7..befe8fadfb 100644 --- a/2019/CVE-2019-3396.json +++ b/2019/CVE-2019-3396.json @@ -107,10 +107,10 @@ "description": "CVE-2019-3396 confluence SSTI RCE", "fork": false, "created_at": "2019-04-10T02:15:47Z", - "updated_at": "2024-09-12T12:36:30Z", + "updated_at": "2024-12-09T11:39:34Z", "pushed_at": "2020-10-01T08:40:07Z", - "stargazers_count": 173, - "watchers_count": 173, + "stargazers_count": 174, + "watchers_count": 174, "has_discussions": false, "forks_count": 66, "allow_forking": true, @@ -124,7 +124,7 @@ ], "visibility": "public", "forks": 66, - "watchers": 173, + "watchers": 174, "score": 0, "subscribers_count": 5 }, diff --git a/2019/CVE-2019-8943.json b/2019/CVE-2019-8943.json index bbab214e89..b4cbb16e71 100644 --- a/2019/CVE-2019-8943.json +++ b/2019/CVE-2019-8943.json @@ -2,15 +2,15 @@ { "id": 334947839, "name": "CVE-2019-8943", - "full_name": "v0lck3r\/CVE-2019-8943", + "full_name": "oussama-rahali\/CVE-2019-8943", "owner": { - "login": "v0lck3r", + "login": "oussama-rahali", "id": 61425261, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61425261?v=4", - "html_url": "https:\/\/github.com\/v0lck3r", + "html_url": "https:\/\/github.com\/oussama-rahali", "user_view_type": "public" }, - "html_url": "https:\/\/github.com\/v0lck3r\/CVE-2019-8943", + "html_url": "https:\/\/github.com\/oussama-rahali\/CVE-2019-8943", "description": "Exploit of CVE-2019-8942 and CVE-2019-8943 ", "fork": false, "created_at": "2021-02-01T12:47:28Z", diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index defdc18f32..133a8809f1 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -888,10 +888,10 @@ "description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含", "fork": false, "created_at": "2022-11-13T11:01:41Z", - "updated_at": "2024-12-09T00:56:39Z", + "updated_at": "2024-12-09T08:01:15Z", "pushed_at": "2022-11-15T09:05:50Z", - "stargazers_count": 205, - "watchers_count": 205, + "stargazers_count": 206, + "watchers_count": 206, "has_discussions": false, "forks_count": 18, "allow_forking": true, @@ -900,7 +900,7 @@ "topics": [], "visibility": "public", "forks": 18, - "watchers": 205, + "watchers": 206, "score": 0, "subscribers_count": 4 }, diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index 979cd6c3dc..c58122f7c5 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -972,7 +972,7 @@ "stargazers_count": 1088, "watchers_count": 1088, "has_discussions": false, - "forks_count": 189, + "forks_count": 190, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -980,7 +980,7 @@ "cve-2021-4034" ], "visibility": "public", - "forks": 189, + "forks": 190, "watchers": 1088, "score": 0, "subscribers_count": 13 diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 3e58d93dc2..3234483c43 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -935,10 +935,10 @@ "description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ", "fork": false, "created_at": "2021-12-10T23:19:28Z", - "updated_at": "2024-11-30T15:57:11Z", + "updated_at": "2024-12-09T06:19:58Z", "pushed_at": "2024-02-12T22:37:25Z", - "stargazers_count": 1810, - "watchers_count": 1810, + "stargazers_count": 1811, + "watchers_count": 1811, "has_discussions": false, "forks_count": 529, "allow_forking": true, @@ -952,7 +952,7 @@ ], "visibility": "public", "forks": 529, - "watchers": 1810, + "watchers": 1811, "score": 0, "subscribers_count": 26 }, diff --git a/2022/CVE-2022-21999.json b/2022/CVE-2022-21999.json index 4fc050360c..56038ed0fd 100644 --- a/2022/CVE-2022-21999.json +++ b/2022/CVE-2022-21999.json @@ -14,10 +14,10 @@ "description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)", "fork": false, "created_at": "2022-02-08T17:25:44Z", - "updated_at": "2024-12-07T00:14:01Z", + "updated_at": "2024-12-09T10:33:10Z", "pushed_at": "2022-02-09T16:54:09Z", - "stargazers_count": 776, - "watchers_count": 776, + "stargazers_count": 777, + "watchers_count": 777, "has_discussions": false, "forks_count": 160, "allow_forking": true, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 160, - "watchers": 776, + "watchers": 777, "score": 0, "subscribers_count": 15 } diff --git a/2022/CVE-2022-22965.json b/2022/CVE-2022-22965.json index db6b48597d..b547404277 100644 --- a/2022/CVE-2022-22965.json +++ b/2022/CVE-2022-22965.json @@ -14,10 +14,10 @@ "description": "Spring4Shell Proof Of Concept\/And vulnerable application CVE-2022-22965", "fork": false, "created_at": "2022-03-30T07:54:45Z", - "updated_at": "2024-11-27T06:47:37Z", + "updated_at": "2024-12-09T09:21:05Z", "pushed_at": "2022-11-09T15:46:06Z", - "stargazers_count": 361, - "watchers_count": 361, + "stargazers_count": 362, + "watchers_count": 362, "has_discussions": false, "forks_count": 105, "allow_forking": true, @@ -35,7 +35,7 @@ ], "visibility": "public", "forks": 105, - "watchers": 361, + "watchers": 362, "score": 0, "subscribers_count": 18 }, diff --git a/2022/CVE-2022-38691.json b/2022/CVE-2022-38691.json index 75fbed3eff..ca9f1c3f10 100644 --- a/2022/CVE-2022-38691.json +++ b/2022/CVE-2022-38691.json @@ -14,10 +14,10 @@ "description": "Let's control Secure Boot Chain ourselves.", "fork": false, "created_at": "2023-12-01T07:32:18Z", - "updated_at": "2024-11-29T18:12:25Z", + "updated_at": "2024-12-09T12:18:55Z", "pushed_at": "2024-02-20T09:05:59Z", - "stargazers_count": 41, - "watchers_count": 41, + "stargazers_count": 42, + "watchers_count": 42, "has_discussions": false, "forks_count": 10, "allow_forking": true, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 10, - "watchers": 41, + "watchers": 42, "score": 0, "subscribers_count": 5 } diff --git a/2022/CVE-2022-39197.json b/2022/CVE-2022-39197.json index 640f0d5647..0064d7f444 100644 --- a/2022/CVE-2022-39197.json +++ b/2022/CVE-2022-39197.json @@ -332,10 +332,10 @@ "description": "CobaltStrike <= 4.7.1 RCE", "fork": false, "created_at": "2022-10-14T11:46:01Z", - "updated_at": "2024-11-25T09:21:07Z", + "updated_at": "2024-12-09T09:21:36Z", "pushed_at": "2022-10-25T05:32:54Z", - "stargazers_count": 376, - "watchers_count": 376, + "stargazers_count": 377, + "watchers_count": 377, "has_discussions": false, "forks_count": 77, "allow_forking": true, @@ -344,7 +344,7 @@ "topics": [], "visibility": "public", "forks": 77, - "watchers": 376, + "watchers": 377, "score": 0, "subscribers_count": 7 }, diff --git a/2023/CVE-2023-21554.json b/2023/CVE-2023-21554.json index 868611c1aa..7525aa85d9 100644 --- a/2023/CVE-2023-21554.json +++ b/2023/CVE-2023-21554.json @@ -14,10 +14,10 @@ "description": "CVE-2023-21554 Windows MessageQueuing PoC,分析见 https:\/\/www.zoemurmure.top\/posts\/cve_2023_21554\/", "fork": false, "created_at": "2023-05-18T10:30:49Z", - "updated_at": "2024-11-18T13:26:39Z", + "updated_at": "2024-12-09T09:20:31Z", "pushed_at": "2023-05-18T10:38:57Z", - "stargazers_count": 54, - "watchers_count": 54, + "stargazers_count": 55, + "watchers_count": 55, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 15, - "watchers": 54, + "watchers": 55, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-38146.json b/2023/CVE-2023-38146.json index 324b5ff56a..6767477ae5 100644 --- a/2023/CVE-2023-38146.json +++ b/2023/CVE-2023-38146.json @@ -19,13 +19,13 @@ "stargazers_count": 189, "watchers_count": 189, "has_discussions": false, - "forks_count": 38, + "forks_count": 37, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 38, + "forks": 37, "watchers": 189, "score": 0, "subscribers_count": 4 diff --git a/2023/CVE-2023-42442.json b/2023/CVE-2023-42442.json index 25e862813b..09712aa7f6 100644 --- a/2023/CVE-2023-42442.json +++ b/2023/CVE-2023-42442.json @@ -45,10 +45,10 @@ "description": "JumpServer 堡垒机未授权综合漏洞利用, Exploit for CVE-2023-42442 \/ CVE-2023-42820 \/ RCE 2021", "fork": false, "created_at": "2023-10-14T09:35:07Z", - "updated_at": "2024-12-06T05:37:00Z", + "updated_at": "2024-12-09T07:21:54Z", "pushed_at": "2024-05-16T07:42:00Z", - "stargazers_count": 222, - "watchers_count": 222, + "stargazers_count": 223, + "watchers_count": 223, "has_discussions": false, "forks_count": 23, "allow_forking": true, @@ -61,7 +61,7 @@ ], "visibility": "public", "forks": 23, - "watchers": 222, + "watchers": 223, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-21006.json b/2024/CVE-2024-21006.json index a16e2d0f81..0926150e2d 100644 --- a/2024/CVE-2024-21006.json +++ b/2024/CVE-2024-21006.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2024-05-01T03:08:48Z", - "updated_at": "2024-11-20T16:30:45Z", + "updated_at": "2024-12-09T09:17:34Z", "pushed_at": "2024-05-05T09:40:22Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 12, + "watchers_count": 12, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 11, + "watchers": 12, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-21413.json b/2024/CVE-2024-21413.json index e8f4c97d3d..675c418eda 100644 --- a/2024/CVE-2024-21413.json +++ b/2024/CVE-2024-21413.json @@ -45,10 +45,10 @@ "description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability", "fork": false, "created_at": "2024-02-16T15:17:59Z", - "updated_at": "2024-12-08T11:39:29Z", + "updated_at": "2024-12-09T09:21:37Z", "pushed_at": "2024-02-19T20:00:35Z", - "stargazers_count": 706, - "watchers_count": 706, + "stargazers_count": 707, + "watchers_count": 707, "has_discussions": false, "forks_count": 153, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 153, - "watchers": 706, + "watchers": 707, "score": 0, "subscribers_count": 10 }, @@ -448,8 +448,8 @@ "description": "CVE-2024-21413 | Microsoft Outlook Remote Code Execution Vulnerability PoC", "fork": false, "created_at": "2024-08-31T13:18:43Z", - "updated_at": "2024-10-25T10:52:39Z", - "pushed_at": "2024-10-24T16:38:25Z", + "updated_at": "2024-12-09T11:37:25Z", + "pushed_at": "2024-12-09T11:37:20Z", "stargazers_count": 8, "watchers_count": 8, "has_discussions": false, diff --git a/2024/CVE-2024-23334.json b/2024/CVE-2024-23334.json index f4d0249e65..bd1c1d0ecd 100644 --- a/2024/CVE-2024-23334.json +++ b/2024/CVE-2024-23334.json @@ -76,10 +76,10 @@ "description": "A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1", "fork": false, "created_at": "2024-03-18T20:39:27Z", - "updated_at": "2024-12-02T12:25:59Z", + "updated_at": "2024-12-09T08:33:20Z", "pushed_at": "2024-03-19T06:37:30Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 13, + "watchers_count": 13, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 12, + "watchers": 13, "score": 0, "subscribers_count": 1 }, @@ -107,10 +107,10 @@ "description": "aiohttp LFI (CVE-2024-23334)", "fork": false, "created_at": "2024-03-19T16:28:56Z", - "updated_at": "2024-07-29T18:47:24Z", + "updated_at": "2024-12-09T08:17:11Z", "pushed_at": "2024-03-19T17:06:26Z", - "stargazers_count": 22, - "watchers_count": 22, + "stargazers_count": 23, + "watchers_count": 23, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 22, + "watchers": 23, "score": 0, "subscribers_count": 1 }, @@ -342,5 +342,36 @@ "watchers": 1, "score": 0, "subscribers_count": 1 + }, + { + "id": 900621696, + "name": "CVE-2024-23334-PoC", + "full_name": "Betan423\/CVE-2024-23334-PoC", + "owner": { + "login": "Betan423", + "id": 125627171, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125627171?v=4", + "html_url": "https:\/\/github.com\/Betan423", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Betan423\/CVE-2024-23334-PoC", + "description": "This repository is a proof of concept (POC) for CVE-2024-23334, demonstrating an attempt to replicate the bug in aiohttp that leads to Local File Inclusion (LFI).", + "fork": false, + "created_at": "2024-12-09T06:51:13Z", + "updated_at": "2024-12-09T09:25:20Z", + "pushed_at": "2024-12-09T09:25:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-23897.json b/2024/CVE-2024-23897.json index 28f5b5a8cd..793d32f389 100644 --- a/2024/CVE-2024-23897.json +++ b/2024/CVE-2024-23897.json @@ -1074,6 +1074,6 @@ "forks": 0, "watchers": 1, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-27198.json b/2024/CVE-2024-27198.json index db9d409408..43a9b6a317 100644 --- a/2024/CVE-2024-27198.json +++ b/2024/CVE-2024-27198.json @@ -288,10 +288,10 @@ "description": "CVE-2024-27198 & CVE-2024-27199 PoC - RCE, Admin Account Creation, Enum Users, Server Information", "fork": false, "created_at": "2024-04-22T22:14:24Z", - "updated_at": "2024-11-24T06:18:34Z", + "updated_at": "2024-12-09T06:46:31Z", "pushed_at": "2024-07-19T14:42:24Z", - "stargazers_count": 26, - "watchers_count": 26, + "stargazers_count": 27, + "watchers_count": 27, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -311,7 +311,7 @@ ], "visibility": "public", "forks": 2, - "watchers": 26, + "watchers": 27, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-27697.json b/2024/CVE-2024-27697.json index 4455998d8b..701a61319a 100644 --- a/2024/CVE-2024-27697.json +++ b/2024/CVE-2024-27697.json @@ -14,10 +14,10 @@ "description": "Arbitrary Code Execution on FuguHub 8.4", "fork": false, "created_at": "2024-03-09T22:24:03Z", - "updated_at": "2024-11-28T09:26:23Z", + "updated_at": "2024-12-09T12:16:00Z", "pushed_at": "2024-03-11T03:09:35Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 5, + "watchers": 6, "score": 0, "subscribers_count": 2 } diff --git a/2024/CVE-2024-30088.json b/2024/CVE-2024-30088.json index 3a6f39743c..4b50e8e397 100644 --- a/2024/CVE-2024-30088.json +++ b/2024/CVE-2024-30088.json @@ -121,7 +121,7 @@ "forks": 31, "watchers": 427, "score": 0, - "subscribers_count": 19 + "subscribers_count": 20 }, { "id": 834461917, diff --git a/2024/CVE-2024-35250.json b/2024/CVE-2024-35250.json index c91bb2e3bd..69b6425e0f 100644 --- a/2024/CVE-2024-35250.json +++ b/2024/CVE-2024-35250.json @@ -14,10 +14,10 @@ "description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver", "fork": false, "created_at": "2024-10-13T19:30:20Z", - "updated_at": "2024-12-07T06:30:14Z", + "updated_at": "2024-12-09T08:36:38Z", "pushed_at": "2024-11-29T16:56:23Z", - "stargazers_count": 216, - "watchers_count": 216, + "stargazers_count": 217, + "watchers_count": 217, "has_discussions": false, "forks_count": 46, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 46, - "watchers": 216, + "watchers": 217, "score": 0, "subscribers_count": 6 }, diff --git a/2024/CVE-2024-36401.json b/2024/CVE-2024-36401.json index 674426b3a0..1b284a9340 100644 --- a/2024/CVE-2024-36401.json +++ b/2024/CVE-2024-36401.json @@ -362,10 +362,10 @@ "description": "geoserver图形化漏洞利用工具", "fork": false, "created_at": "2024-10-05T10:08:55Z", - "updated_at": "2024-12-04T05:26:55Z", + "updated_at": "2024-12-09T06:55:27Z", "pushed_at": "2024-10-08T03:16:26Z", - "stargazers_count": 21, - "watchers_count": 21, + "stargazers_count": 22, + "watchers_count": 22, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -374,7 +374,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 21, + "watchers": 22, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-38063.json b/2024/CVE-2024-38063.json index 73abb9aac4..265fe3109f 100644 --- a/2024/CVE-2024-38063.json +++ b/2024/CVE-2024-38063.json @@ -420,10 +420,10 @@ "description": "CVE-2024-38063 is a critical security vulnerability in the Windows TCP\/IP stack that allows for remote code execution (RCE)", "fork": false, "created_at": "2024-08-31T13:56:26Z", - "updated_at": "2024-11-24T20:48:28Z", - "pushed_at": "2024-11-24T10:59:13Z", - "stargazers_count": 15, - "watchers_count": 15, + "updated_at": "2024-12-09T08:30:58Z", + "pushed_at": "2024-12-09T07:16:33Z", + "stargazers_count": 16, + "watchers_count": 16, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -432,7 +432,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 15, + "watchers": 16, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-38080.json b/2024/CVE-2024-38080.json index 2fbad60bba..ff23edfd79 100644 --- a/2024/CVE-2024-38080.json +++ b/2024/CVE-2024-38080.json @@ -14,19 +14,19 @@ "description": "poc code for CVE-2024-38080", "fork": false, "created_at": "2024-09-01T11:25:22Z", - "updated_at": "2024-12-05T12:34:41Z", + "updated_at": "2024-12-09T07:04:48Z", "pushed_at": "2024-09-01T11:35:25Z", - "stargazers_count": 28, - "watchers_count": 28, + "stargazers_count": 29, + "watchers_count": 29, "has_discussions": false, - "forks_count": 8, + "forks_count": 9, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 8, - "watchers": 28, + "forks": 9, + "watchers": 29, "score": 0, "subscribers_count": 2 } diff --git a/2024/CVE-2024-38193.json b/2024/CVE-2024-38193.json index 1c8e7d73d9..349055c331 100644 --- a/2024/CVE-2024-38193.json +++ b/2024/CVE-2024-38193.json @@ -14,19 +14,19 @@ "description": null, "fork": false, "created_at": "2024-12-03T08:56:59Z", - "updated_at": "2024-12-09T06:13:16Z", + "updated_at": "2024-12-09T11:39:03Z", "pushed_at": "2024-11-18T23:48:31Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 14, + "watchers_count": 14, "has_discussions": false, - "forks_count": 6, + "forks_count": 11, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 6, - "watchers": 7, + "forks": 11, + "watchers": 14, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-41713.json b/2024/CVE-2024-41713.json index 02dc259ce5..ef8b03a8ab 100644 --- a/2024/CVE-2024-41713.json +++ b/2024/CVE-2024-41713.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2024-12-05T06:13:57Z", - "updated_at": "2024-12-07T12:14:47Z", + "updated_at": "2024-12-09T07:52:01Z", "pushed_at": "2024-12-05T07:55:04Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 9, + "watchers": 10, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-43044.json b/2024/CVE-2024-43044.json index 992263c943..04ad5cf5b6 100644 --- a/2024/CVE-2024-43044.json +++ b/2024/CVE-2024-43044.json @@ -14,10 +14,10 @@ "description": "The script checks Jenkins endpoints for CVE-2024-43044 by retrieving the Jenkins version from the innstance and comparing it against known vulnerable version ranges.", "fork": false, "created_at": "2024-08-08T08:28:26Z", - "updated_at": "2024-12-02T12:24:10Z", + "updated_at": "2024-12-09T08:34:29Z", "pushed_at": "2024-08-08T09:32:00Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 12, + "watchers_count": 12, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 6, - "watchers": 11, + "watchers": 12, "score": 0, "subscribers_count": 1 }, @@ -80,10 +80,10 @@ "description": "CVE-2024-43044的利用方式", "fork": false, "created_at": "2024-08-13T07:32:35Z", - "updated_at": "2024-10-16T01:14:36Z", + "updated_at": "2024-12-09T08:34:51Z", "pushed_at": "2024-08-13T07:43:22Z", - "stargazers_count": 15, - "watchers_count": 15, + "stargazers_count": 16, + "watchers_count": 16, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -92,7 +92,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 15, + "watchers": 16, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-48990.json b/2024/CVE-2024-48990.json index 6845bf4a56..a6558ddb33 100644 --- a/2024/CVE-2024-48990.json +++ b/2024/CVE-2024-48990.json @@ -14,19 +14,19 @@ "description": "PoC for CVE-2024-48990", "fork": false, "created_at": "2024-11-20T18:41:25Z", - "updated_at": "2024-12-06T00:28:40Z", + "updated_at": "2024-12-09T08:38:49Z", "pushed_at": "2024-11-20T18:49:33Z", - "stargazers_count": 85, - "watchers_count": 85, + "stargazers_count": 87, + "watchers_count": 87, "has_discussions": false, - "forks_count": 14, + "forks_count": 15, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 14, - "watchers": 85, + "forks": 15, + "watchers": 87, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-49039.json b/2024/CVE-2024-49039.json index 88ae179dfd..c8213cd982 100644 --- a/2024/CVE-2024-49039.json +++ b/2024/CVE-2024-49039.json @@ -14,10 +14,10 @@ "description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler", "fork": false, "created_at": "2024-11-19T08:57:18Z", - "updated_at": "2024-12-09T04:09:57Z", + "updated_at": "2024-12-09T08:10:55Z", "pushed_at": "2024-11-19T09:15:26Z", - "stargazers_count": 82, - "watchers_count": 82, + "stargazers_count": 83, + "watchers_count": 83, "has_discussions": false, "forks_count": 18, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 18, - "watchers": 82, + "watchers": 83, "score": 0, "subscribers_count": 1 } diff --git a/README.md b/README.md index 517c0006a0..0fbfd232b8 100644 --- a/README.md +++ b/README.md @@ -2952,6 +2952,7 @@ - [Pylonet/CVE-2024-23334](https://github.com/Pylonet/CVE-2024-23334) - [Arc4he/CVE-2024-23334-PoC](https://github.com/Arc4he/CVE-2024-23334-PoC) - [TheRedP4nther/LFI-aiohttp-CVE-2024-23334-PoC](https://github.com/TheRedP4nther/LFI-aiohttp-CVE-2024-23334-PoC) +- [Betan423/CVE-2024-23334-PoC](https://github.com/Betan423/CVE-2024-23334-PoC) ### CVE-2024-23339 (2024-01-22) @@ -6634,7 +6635,11 @@ - [jackalkarlos/CVE-2024-46658](https://github.com/jackalkarlos/CVE-2024-46658) -### CVE-2024-46901 +### CVE-2024-46901 (2024-12-09) + +Insufficient validation of filenames against control characters in Apache Subversion repositories served via mod_dav_svn allows authenticated users with commit access to commit a corrupted revision, leading to disruption for users of the repository.\n\nAll versions of Subversion up to and including Subversion 1.14.4 are affected if serving repositories via mod_dav_svn. Users are recommended to upgrade to version 1.14.5, which fixes this issue.\n\nRepositories served via other access methods are not affected. + + - [devhaozi/CVE-2024-46901](https://github.com/devhaozi/CVE-2024-46901) ### CVE-2024-46986 (2024-09-18) @@ -11040,7 +11045,11 @@ - [Toxich4/CVE-2023-30459](https://github.com/Toxich4/CVE-2023-30459) -### CVE-2023-30486 +### CVE-2023-30486 (2024-12-09) + +Missing Authorization vulnerability in HashThemes Square allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Square: from n/a through 2.0.0. + + - [RandomRobbieBF/CVE-2023-30486](https://github.com/RandomRobbieBF/CVE-2023-30486) ### CVE-2023-30533 (2023-04-24) @@ -11390,7 +11399,11 @@ - [jmrcsnchz/CVE-2023-32073](https://github.com/jmrcsnchz/CVE-2023-32073) -### CVE-2023-32117 +### CVE-2023-32117 (2024-12-09) + +Missing Authorization vulnerability in SoftLab Integrate Google Drive allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Integrate Google Drive: from n/a through 1.1.99. + + - [RandomRobbieBF/CVE-2023-32117](https://github.com/RandomRobbieBF/CVE-2023-32117) ### CVE-2023-32162 (2023-09-06) @@ -36126,7 +36139,7 @@ WordPress through 5.0.3 allows Path Traversal in wp_crop_image(). An attacker (who has privileges to crop an image) can write the output image to an arbitrary directory via a filename containing two image extensions and ../ sequences, such as a filename ending with the .jpg?/../../file.jpg substring. -- [v0lck3r/CVE-2019-8943](https://github.com/v0lck3r/CVE-2019-8943) +- [oussama-rahali/CVE-2019-8943](https://github.com/oussama-rahali/CVE-2019-8943) - [hadrian3689/wordpress_cropimage](https://github.com/hadrian3689/wordpress_cropimage) ### CVE-2019-8956 (2019-04-01) @@ -48152,6 +48165,7 @@ - [Unix13/metasploitable2](https://github.com/Unix13/metasploitable2) - [cyberharsh/PHP_CVE-2012-1823](https://github.com/cyberharsh/PHP_CVE-2012-1823) - [0xl0k1/CVE-2012-1823](https://github.com/0xl0k1/CVE-2012-1823) +- [Jimmy01240397/CVE-2012-1823-Analyze](https://github.com/Jimmy01240397/CVE-2012-1823-Analyze) ### CVE-2012-1831 (2012-07-05)