diff --git a/2014/CVE-2014-0160.json b/2014/CVE-2014-0160.json index c31071ef5c..6e67059152 100644 --- a/2014/CVE-2014-0160.json +++ b/2014/CVE-2014-0160.json @@ -253,10 +253,10 @@ "description": "OpenSSL TLS heartbeat read overrun (CVE-2014-0160)", "fork": false, "created_at": "2014-04-08T20:58:26Z", - "updated_at": "2022-03-23T08:58:41Z", + "updated_at": "2024-03-28T09:37:17Z", "pushed_at": "2014-04-11T02:40:46Z", - "stargazers_count": 38, - "watchers_count": 38, + "stargazers_count": 39, + "watchers_count": 39, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -265,7 +265,7 @@ "topics": [], "visibility": "public", "forks": 8, - "watchers": 38, + "watchers": 39, "score": 0, "subscribers_count": 3 }, diff --git a/2018/CVE-2018-0171.json b/2018/CVE-2018-0171.json index 848e865a28..b68b0d4371 100644 --- a/2018/CVE-2018-0171.json +++ b/2018/CVE-2018-0171.json @@ -13,10 +13,10 @@ "description": "Cisco SmartInstall Exploit [CVE-2018-0171]", "fork": false, "created_at": "2023-02-01T03:51:56Z", - "updated_at": "2024-03-21T22:18:17Z", + "updated_at": "2024-03-28T11:57:23Z", "pushed_at": "2023-02-06T17:17:40Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 2, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 1 } diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 34bd0aedc9..76d1512157 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -43,12 +43,12 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2024-03-27T08:44:55Z", + "updated_at": "2024-03-28T07:47:24Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 4013, - "watchers_count": 4013, + "stargazers_count": 4014, + "watchers_count": 4014, "has_discussions": false, - "forks_count": 1081, + "forks_count": 1080, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -74,8 +74,8 @@ "webshell" ], "visibility": "public", - "forks": 1081, - "watchers": 4013, + "forks": 1080, + "watchers": 4014, "score": 0, "subscribers_count": 151 }, diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index fe6942bc54..b2a01197b2 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -170,10 +170,10 @@ "description": "Exploit for zerologon cve-2020-1472", "fork": false, "created_at": "2020-09-14T19:19:07Z", - "updated_at": "2024-03-25T06:10:46Z", + "updated_at": "2024-03-28T06:43:41Z", "pushed_at": "2020-10-15T18:31:15Z", - "stargazers_count": 590, - "watchers_count": 590, + "stargazers_count": 591, + "watchers_count": 591, "has_discussions": false, "forks_count": 143, "allow_forking": true, @@ -182,7 +182,7 @@ "topics": [], "visibility": "public", "forks": 143, - "watchers": 590, + "watchers": 591, "score": 0, "subscribers_count": 13 }, diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 153ebdb47e..2b32bab351 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,12 +13,12 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2024-03-27T08:44:55Z", + "updated_at": "2024-03-28T07:47:24Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 4013, - "watchers_count": 4013, + "stargazers_count": 4014, + "watchers_count": 4014, "has_discussions": false, - "forks_count": 1081, + "forks_count": 1080, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -44,8 +44,8 @@ "webshell" ], "visibility": "public", - "forks": 1081, - "watchers": 4013, + "forks": 1080, + "watchers": 4014, "score": 0, "subscribers_count": 151 }, diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index cceb51847b..095ead7703 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -851,10 +851,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2024-03-27T12:27:01Z", + "updated_at": "2024-03-28T09:51:49Z", "pushed_at": "2024-02-01T06:53:03Z", - "stargazers_count": 1227, - "watchers_count": 1227, + "stargazers_count": 1228, + "watchers_count": 1228, "has_discussions": false, "forks_count": 154, "allow_forking": true, @@ -870,7 +870,7 @@ ], "visibility": "public", "forks": 154, - "watchers": 1227, + "watchers": 1228, "score": 0, "subscribers_count": 12 } diff --git a/2021/CVE-2021-34527.json b/2021/CVE-2021-34527.json index 72dfe4a0c8..6048edcc54 100644 --- a/2021/CVE-2021-34527.json +++ b/2021/CVE-2021-34527.json @@ -109,10 +109,10 @@ "description": "PrintNightmare - Windows Print Spooler RCE\/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits", "fork": false, "created_at": "2021-07-03T15:15:12Z", - "updated_at": "2024-03-26T19:20:00Z", + "updated_at": "2024-03-28T06:23:40Z", "pushed_at": "2021-09-13T12:12:17Z", - "stargazers_count": 105, - "watchers_count": 105, + "stargazers_count": 104, + "watchers_count": 104, "has_discussions": false, "forks_count": 38, "allow_forking": true, @@ -128,7 +128,7 @@ ], "visibility": "public", "forks": 38, - "watchers": 105, + "watchers": 104, "score": 0, "subscribers_count": 8 }, diff --git a/2021/CVE-2021-3490.json b/2021/CVE-2021-3490.json index 1236e390c4..31ae308a4d 100644 --- a/2021/CVE-2021-3490.json +++ b/2021/CVE-2021-3490.json @@ -13,19 +13,19 @@ "description": null, "fork": false, "created_at": "2021-06-24T18:50:17Z", - "updated_at": "2024-03-27T00:13:33Z", + "updated_at": "2024-03-28T09:36:08Z", "pushed_at": "2023-07-10T16:41:49Z", - "stargazers_count": 285, - "watchers_count": 285, + "stargazers_count": 286, + "watchers_count": 286, "has_discussions": false, - "forks_count": 51, + "forks_count": 52, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 51, - "watchers": 285, + "forks": 52, + "watchers": 286, "score": 0, "subscribers_count": 8 }, diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index f540e39ec7..18f9843919 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -2466,19 +2466,19 @@ "description": "pkexec (Polkit) exploit of Privilege Escalation vulnerability CVE-2021-4034", "fork": false, "created_at": "2022-01-28T15:16:44Z", - "updated_at": "2024-02-24T11:42:38Z", + "updated_at": "2024-03-28T09:35:58Z", "pushed_at": "2022-01-28T15:17:47Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, - "watchers": 5, + "forks": 2, + "watchers": 6, "score": 0, "subscribers_count": 2 }, diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json index 3188adabed..f71c9b4793 100644 --- a/2021/CVE-2021-40444.json +++ b/2021/CVE-2021-40444.json @@ -223,10 +223,10 @@ "description": "CVE-2021-40444 PoC", "fork": false, "created_at": "2021-09-10T16:55:53Z", - "updated_at": "2024-03-25T18:09:09Z", + "updated_at": "2024-03-28T06:23:50Z", "pushed_at": "2021-12-25T18:31:02Z", - "stargazers_count": 1531, - "watchers_count": 1531, + "stargazers_count": 1530, + "watchers_count": 1530, "has_discussions": false, "forks_count": 480, "allow_forking": true, @@ -235,7 +235,7 @@ "topics": [], "visibility": "public", "forks": 480, - "watchers": 1531, + "watchers": 1530, "score": 0, "subscribers_count": 28 }, diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json index 15c4880170..9a8822ae31 100644 --- a/2021/CVE-2021-42278.json +++ b/2021/CVE-2021-42278.json @@ -13,10 +13,10 @@ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-11T15:10:30Z", - "updated_at": "2024-03-19T07:30:38Z", + "updated_at": "2024-03-28T07:27:11Z", "pushed_at": "2022-07-10T22:23:13Z", - "stargazers_count": 954, - "watchers_count": 954, + "stargazers_count": 955, + "watchers_count": 955, "has_discussions": false, "forks_count": 191, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 191, - "watchers": 954, + "watchers": 955, "score": 0, "subscribers_count": 26 }, diff --git a/2021/CVE-2021-43798.json b/2021/CVE-2021-43798.json index 5f2c71b2c1..7b531d03e2 100644 --- a/2021/CVE-2021-43798.json +++ b/2021/CVE-2021-43798.json @@ -201,10 +201,10 @@ "description": "A exploit tool for Grafana Unauthorized arbitrary file reading vulnerability (CVE-2021-43798), it can burst plugins \/ extract secret_key \/ decrypt data_source info automatic.", "fork": false, "created_at": "2021-12-07T15:11:34Z", - "updated_at": "2024-03-26T13:58:11Z", - "pushed_at": "2023-11-07T02:48:51Z", - "stargazers_count": 236, - "watchers_count": 236, + "updated_at": "2024-03-28T09:50:02Z", + "pushed_at": "2024-03-28T08:46:27Z", + "stargazers_count": 238, + "watchers_count": 238, "has_discussions": false, "forks_count": 36, "allow_forking": true, @@ -217,7 +217,7 @@ ], "visibility": "public", "forks": 36, - "watchers": 236, + "watchers": 238, "score": 0, "subscribers_count": 5 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 8445927cc7..b600944001 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -6721,36 +6721,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 438650245, - "name": "log4j_temp_CVE-2021-44228", - "full_name": "111coding\/log4j_temp_CVE-2021-44228", - "owner": { - "login": "111coding", - "id": 49793527, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49793527?v=4", - "html_url": "https:\/\/github.com\/111coding" - }, - "html_url": "https:\/\/github.com\/111coding\/log4j_temp_CVE-2021-44228", - "description": null, - "fork": false, - "created_at": "2021-12-15T14:01:23Z", - "updated_at": "2021-12-18T17:13:29Z", - "pushed_at": "2021-12-18T17:13:25Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 2 - }, { "id": 438664340, "name": "log4j-vuln-coverage-check", diff --git a/2022/CVE-2022-0337.json b/2022/CVE-2022-0337.json index e67ca832bf..ca7788475b 100644 --- a/2022/CVE-2022-0337.json +++ b/2022/CVE-2022-0337.json @@ -13,10 +13,10 @@ "description": "🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337", "fork": false, "created_at": "2022-03-19T08:10:46Z", - "updated_at": "2024-03-24T02:53:53Z", + "updated_at": "2024-03-28T10:13:18Z", "pushed_at": "2022-09-04T17:28:56Z", - "stargazers_count": 323, - "watchers_count": 323, + "stargazers_count": 324, + "watchers_count": 324, "has_discussions": false, "forks_count": 36, "allow_forking": true, @@ -41,7 +41,7 @@ ], "visibility": "public", "forks": 36, - "watchers": 323, + "watchers": 324, "score": 0, "subscribers_count": 6 }, diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json index da12f06b04..dcdf2d22d0 100644 --- a/2022/CVE-2022-22954.json +++ b/2022/CVE-2022-22954.json @@ -766,10 +766,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2024-03-27T12:27:01Z", + "updated_at": "2024-03-28T09:51:49Z", "pushed_at": "2024-02-01T06:53:03Z", - "stargazers_count": 1227, - "watchers_count": 1227, + "stargazers_count": 1228, + "watchers_count": 1228, "has_discussions": false, "forks_count": 154, "allow_forking": true, @@ -785,7 +785,7 @@ ], "visibility": "public", "forks": 154, - "watchers": 1227, + "watchers": 1228, "score": 0, "subscribers_count": 12 }, diff --git a/2022/CVE-2022-2586.json b/2022/CVE-2022-2586.json index 53a5db3483..87513fb9dc 100644 --- a/2022/CVE-2022-2586.json +++ b/2022/CVE-2022-2586.json @@ -48,13 +48,13 @@ "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, - "forks_count": 2, + "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 2, + "forks": 3, "watchers": 3, "score": 0, "subscribers_count": 1 diff --git a/2023/CVE-2023-23397.json b/2023/CVE-2023-23397.json index 8d7058b2be..e4bf83a34c 100644 --- a/2023/CVE-2023-23397.json +++ b/2023/CVE-2023-23397.json @@ -690,13 +690,13 @@ "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 2, "watchers": 5, "score": 0, "subscribers_count": 1 diff --git a/2023/CVE-2023-24955.json b/2023/CVE-2023-24955.json index 16ab0fb48e..9937a38ecd 100644 --- a/2023/CVE-2023-24955.json +++ b/2023/CVE-2023-24955.json @@ -13,10 +13,10 @@ "description": "Exploit for Microsoft SharePoint 2019", "fork": false, "created_at": "2023-12-28T09:08:47Z", - "updated_at": "2024-03-27T00:23:14Z", + "updated_at": "2024-03-28T10:46:11Z", "pushed_at": "2023-12-28T10:02:02Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-33246.json b/2023/CVE-2023-33246.json index 6728b80ecb..9f505ea89f 100644 --- a/2023/CVE-2023-33246.json +++ b/2023/CVE-2023-33246.json @@ -138,7 +138,7 @@ "stargazers_count": 96, "watchers_count": 96, "has_discussions": false, - "forks_count": 20, + "forks_count": 21, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -148,7 +148,7 @@ "rocketmq" ], "visibility": "public", - "forks": 20, + "forks": 21, "watchers": 96, "score": 0, "subscribers_count": 3 diff --git a/2023/CVE-2023-36874.json b/2023/CVE-2023-36874.json index 6b70f12428..258de9df5e 100644 --- a/2023/CVE-2023-36874.json +++ b/2023/CVE-2023-36874.json @@ -13,10 +13,10 @@ "description": "CVE-2023-36874 PoC", "fork": false, "created_at": "2023-08-20T13:50:42Z", - "updated_at": "2024-03-19T07:31:07Z", + "updated_at": "2024-03-28T11:44:33Z", "pushed_at": "2024-03-13T18:33:17Z", - "stargazers_count": 80, - "watchers_count": 80, + "stargazers_count": 79, + "watchers_count": 79, "has_discussions": false, "forks_count": 27, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 27, - "watchers": 80, + "watchers": 79, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-42442.json b/2023/CVE-2023-42442.json index cf6f7ff49b..c8765b0ac1 100644 --- a/2023/CVE-2023-42442.json +++ b/2023/CVE-2023-42442.json @@ -43,10 +43,10 @@ "description": "JumpServer 堡垒机未授权综合漏洞利用, Exploit for CVE-2023-42442 \/ CVE-2023-42820 \/ RCE 2021", "fork": false, "created_at": "2023-10-14T09:35:07Z", - "updated_at": "2024-03-27T15:06:59Z", + "updated_at": "2024-03-28T07:17:02Z", "pushed_at": "2024-02-20T09:03:22Z", - "stargazers_count": 139, - "watchers_count": 139, + "stargazers_count": 140, + "watchers_count": 140, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -59,7 +59,7 @@ ], "visibility": "public", "forks": 11, - "watchers": 139, + "watchers": 140, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-42789.json b/2023/CVE-2023-42789.json new file mode 100644 index 0000000000..963dae5670 --- /dev/null +++ b/2023/CVE-2023-42789.json @@ -0,0 +1,32 @@ +[ + { + "id": 778714358, + "name": "CVE-2023-42789", + "full_name": "jhonnybonny\/CVE-2023-42789", + "owner": { + "login": "jhonnybonny", + "id": 87495218, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87495218?v=4", + "html_url": "https:\/\/github.com\/jhonnybonny" + }, + "html_url": "https:\/\/github.com\/jhonnybonny\/CVE-2023-42789", + "description": "Check CVE-2023-42789 ", + "fork": false, + "created_at": "2024-03-28T08:59:12Z", + "updated_at": "2024-03-28T09:03:10Z", + "pushed_at": "2024-03-28T09:10:21Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index 015b81679e..70761399ab 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -13,19 +13,19 @@ "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "fork": false, "created_at": "2024-01-16T06:52:02Z", - "updated_at": "2024-03-28T06:09:54Z", + "updated_at": "2024-03-28T12:05:22Z", "pushed_at": "2024-03-27T18:25:56Z", - "stargazers_count": 158, - "watchers_count": 158, + "stargazers_count": 187, + "watchers_count": 187, "has_discussions": false, - "forks_count": 30, + "forks_count": 33, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 30, - "watchers": 158, + "forks": 33, + "watchers": 187, "score": 0, "subscribers_count": 3 }, diff --git a/2023/CVE-2023-47246.json b/2023/CVE-2023-47246.json index e65e19866b..2fca8008fa 100644 --- a/2023/CVE-2023-47246.json +++ b/2023/CVE-2023-47246.json @@ -18,7 +18,7 @@ "stargazers_count": 49, "watchers_count": 49, "has_discussions": false, - "forks_count": 10, + "forks_count": 11, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -30,7 +30,7 @@ "sysaid" ], "visibility": "public", - "forks": 10, + "forks": 11, "watchers": 49, "score": 0, "subscribers_count": 1 diff --git a/2023/CVE-2023-48022.json b/2023/CVE-2023-48022.json index d2f4b99290..7442ca9379 100644 --- a/2023/CVE-2023-48022.json +++ b/2023/CVE-2023-48022.json @@ -13,10 +13,10 @@ "description": "CVE-2023-48022 exploit modified from Bishop Fox work", "fork": false, "created_at": "2024-01-10T06:26:01Z", - "updated_at": "2024-01-10T06:33:09Z", + "updated_at": "2024-03-28T06:53:18Z", "pushed_at": "2024-01-10T06:33:04Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-48788.json b/2023/CVE-2023-48788.json index bea4d2a283..1ad2c8422e 100644 --- a/2023/CVE-2023-48788.json +++ b/2023/CVE-2023-48788.json @@ -13,10 +13,10 @@ "description": "Fortinet FortiClient EMS SQL Injection", "fork": false, "created_at": "2024-03-18T20:50:48Z", - "updated_at": "2024-03-28T02:08:42Z", + "updated_at": "2024-03-28T12:02:44Z", "pushed_at": "2024-03-20T20:42:41Z", - "stargazers_count": 22, - "watchers_count": 22, + "stargazers_count": 23, + "watchers_count": 23, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 22, + "watchers": 23, "score": 0, "subscribers_count": 4 } diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json index 914ebcd1f9..416e5ed452 100644 --- a/2024/CVE-2024-1086.json +++ b/2024/CVE-2024-1086.json @@ -13,12 +13,12 @@ "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.", "fork": false, "created_at": "2024-03-20T21:16:41Z", - "updated_at": "2024-03-28T06:25:09Z", + "updated_at": "2024-03-28T12:30:02Z", "pushed_at": "2024-03-27T09:22:28Z", - "stargazers_count": 392, - "watchers_count": 392, + "stargazers_count": 420, + "watchers_count": 420, "has_discussions": false, - "forks_count": 39, + "forks_count": 43, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -30,8 +30,8 @@ "poc" ], "visibility": "public", - "forks": 39, - "watchers": 392, + "forks": 43, + "watchers": 420, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-20767.json b/2024/CVE-2024-20767.json index 088ccb003d..3771720470 100644 --- a/2024/CVE-2024-20767.json +++ b/2024/CVE-2024-20767.json @@ -82,6 +82,36 @@ "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 5, + "score": 0, + "subscribers_count": 1 + }, + { + "id": 778686568, + "name": "cve-2024-20767", + "full_name": "huyqa\/cve-2024-20767", + "owner": { + "login": "huyqa", + "id": 56718313, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56718313?v=4", + "html_url": "https:\/\/github.com\/huyqa" + }, + "html_url": "https:\/\/github.com\/huyqa\/cve-2024-20767", + "description": null, + "fork": false, + "created_at": "2024-03-28T07:46:31Z", + "updated_at": "2024-03-28T07:47:00Z", + "pushed_at": "2024-03-28T07:46:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -89,8 +119,8 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 5, + "watchers": 0, "score": 0, - "subscribers_count": 1 + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-21388.json b/2024/CVE-2024-21388.json new file mode 100644 index 0000000000..fd58094e05 --- /dev/null +++ b/2024/CVE-2024-21388.json @@ -0,0 +1,32 @@ +[ + { + "id": 778727781, + "name": "CVE-2024-21388", + "full_name": "d0rb\/CVE-2024-21388", + "owner": { + "login": "d0rb", + "id": 10403781, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10403781?v=4", + "html_url": "https:\/\/github.com\/d0rb" + }, + "html_url": "https:\/\/github.com\/d0rb\/CVE-2024-21388", + "description": "This Python script exploits a vulnerability (CVE-2024-21388) in Microsoft Edge, allowing silent installation of browser extensions with elevated privileges via a private API.", + "fork": false, + "created_at": "2024-03-28T09:31:31Z", + "updated_at": "2024-03-28T09:33:26Z", + "pushed_at": "2024-03-28T09:33:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-21413.json b/2024/CVE-2024-21413.json index c4650b883b..ff98f43ca5 100644 --- a/2024/CVE-2024-21413.json +++ b/2024/CVE-2024-21413.json @@ -43,10 +43,10 @@ "description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability", "fork": false, "created_at": "2024-02-16T15:17:59Z", - "updated_at": "2024-03-27T07:19:06Z", + "updated_at": "2024-03-28T09:14:01Z", "pushed_at": "2024-02-19T20:00:35Z", - "stargazers_count": 547, - "watchers_count": 547, + "stargazers_count": 548, + "watchers_count": 548, "has_discussions": false, "forks_count": 123, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 123, - "watchers": 547, + "watchers": 548, "score": 0, "subscribers_count": 7 }, diff --git a/2024/CVE-2024-21626.json b/2024/CVE-2024-21626.json index 8621b25479..607a1af709 100644 --- a/2024/CVE-2024-21626.json +++ b/2024/CVE-2024-21626.json @@ -43,10 +43,10 @@ "description": "PoC and Detection for CVE-2024-21626", "fork": false, "created_at": "2024-02-01T15:28:37Z", - "updated_at": "2024-03-15T14:51:58Z", + "updated_at": "2024-03-28T08:09:37Z", "pushed_at": "2024-02-06T16:09:05Z", - "stargazers_count": 51, - "watchers_count": 51, + "stargazers_count": 52, + "watchers_count": 52, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 51, + "watchers": 52, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-2193.json b/2024/CVE-2024-2193.json new file mode 100644 index 0000000000..456f1c3a2a --- /dev/null +++ b/2024/CVE-2024-2193.json @@ -0,0 +1,32 @@ +[ + { + "id": 778680882, + "name": "CVE-2024-2193", + "full_name": "uthrasri\/CVE-2024-2193", + "owner": { + "login": "uthrasri", + "id": 145666390, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4", + "html_url": "https:\/\/github.com\/uthrasri" + }, + "html_url": "https:\/\/github.com\/uthrasri\/CVE-2024-2193", + "description": null, + "fork": false, + "created_at": "2024-03-28T07:30:04Z", + "updated_at": "2024-03-28T07:31:14Z", + "pushed_at": "2024-03-28T07:31:46Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-28085.json b/2024/CVE-2024-28085.json index e7bb614b8e..bd7e1a4b3e 100644 --- a/2024/CVE-2024-28085.json +++ b/2024/CVE-2024-28085.json @@ -13,10 +13,10 @@ "description": "WallEscape vulnerability in util-linux", "fork": false, "created_at": "2024-03-11T00:15:03Z", - "updated_at": "2024-03-28T03:01:18Z", + "updated_at": "2024-03-28T09:55:38Z", "pushed_at": "2024-03-12T00:28:14Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 6, + "watchers": 7, "score": 0, "subscribers_count": 1 } diff --git a/README.md b/README.md index 7c0cb6ad9a..e160773cb4 100644 --- a/README.md +++ b/README.md @@ -175,6 +175,9 @@ ### CVE-2024-2169 - [douglasbuzatto/G3-Loop-DoS](https://github.com/douglasbuzatto/G3-Loop-DoS) +### CVE-2024-2193 +- [uthrasri/CVE-2024-2193](https://github.com/uthrasri/CVE-2024-2193) + ### CVE-2024-2432 - [Hagrid29/CVE-2024-2432-PaloAlto-GlobalProtect-EoP](https://github.com/Hagrid29/CVE-2024-2432-PaloAlto-GlobalProtect-EoP) @@ -220,6 +223,7 @@ - [yoryio/CVE-2024-20767](https://github.com/yoryio/CVE-2024-20767) - [m-cetin/CVE-2024-20767](https://github.com/m-cetin/CVE-2024-20767) - [Chocapikk/CVE-2024-20767](https://github.com/Chocapikk/CVE-2024-20767) +- [huyqa/cve-2024-20767](https://github.com/huyqa/cve-2024-20767) ### CVE-2024-20931 (2024-02-16) @@ -245,6 +249,13 @@ - [d0rb/CVE-2024-21378](https://github.com/d0rb/CVE-2024-21378) +### CVE-2024-21388 (2024-01-30) + +<code>Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability +</code> + +- [d0rb/CVE-2024-21388](https://github.com/d0rb/CVE-2024-21388) + ### CVE-2024-21412 (2024-02-13) <code>Internet Shortcut Files Security Feature Bypass Vulnerability @@ -6340,6 +6351,9 @@ - [actuator/wave.ai.browser](https://github.com/actuator/wave.ai.browser) +### CVE-2023-42789 +- [jhonnybonny/CVE-2023-42789](https://github.com/jhonnybonny/CVE-2023-42789) + ### CVE-2023-42793 (2023-09-19) <code>In JetBrains TeamCity before 2023.05.4 authentication bypass leading to RCE on TeamCity Server was possible @@ -20464,7 +20478,6 @@ - [gitlab-de/log4j-resources](https://github.com/gitlab-de/log4j-resources) - [redhuntlabs/Log4JHunt](https://github.com/redhuntlabs/Log4JHunt) - [mss/log4shell-hotfix-side-effect](https://github.com/mss/log4shell-hotfix-side-effect) -- [111coding/log4j_temp_CVE-2021-44228](https://github.com/111coding/log4j_temp_CVE-2021-44228) - [MeterianHQ/log4j-vuln-coverage-check](https://github.com/MeterianHQ/log4j-vuln-coverage-check) - [sebiboga/jmeter-fix-cve-2021-44228-windows](https://github.com/sebiboga/jmeter-fix-cve-2021-44228-windows) - [mitiga/log4shell-cloud-scanner](https://github.com/mitiga/log4shell-cloud-scanner)