From ca59258b41d67fa1552662f71ba177e20262cd9b Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Wed, 15 Jan 2025 03:32:54 +0900 Subject: [PATCH] Auto Update 2025/01/14 18:32:54 --- 2007/CVE-2007-2447.json | 62 ++++++++++---------- 2009/CVE-2009-2265.json | 31 ---------- 2012/CVE-2012-4869.json | 31 ---------- 2014/CVE-2014-3566.json | 2 +- 2014/CVE-2014-6271.json | 31 ---------- 2015/CVE-2015-1328.json | 4 +- 2015/CVE-2015-6967.json | 31 ---------- 2017/CVE-2017-5638.json | 31 ---------- 2018/CVE-2018-7600.json | 31 ---------- 2019/CVE-2019-0708.json | 32 +++++----- 2019/CVE-2019-11447.json | 31 ---------- 2019/CVE-2019-1253.json | 8 +-- 2019/CVE-2019-16113.json | 63 +++++--------------- 2021/CVE-2021-24155.json | 8 +-- 2021/CVE-2021-3560.json | 8 +-- 2021/CVE-2021-40444.json | 8 +-- 2021/CVE-2021-44228.json | 37 ------------ 2022/CVE-2022-24706.json | 4 +- 2022/CVE-2022-38694.json | 4 +- 2023/CVE-2023-28252.json | 8 +-- 2023/CVE-2023-32590.json | 33 +++++++++++ 2023/CVE-2023-45866.json | 8 +-- 2023/CVE-2023-46805.json | 31 ++++++++++ 2024/CVE-2024-0044.json | 8 +-- 2024/CVE-2024-10571.json | 33 +++++++++++ 2024/CVE-2024-11396.json | 33 +++++++++++ 2024/CVE-2024-12157.json | 33 +++++++++++ 2024/CVE-2024-12252.json | 33 +++++++++++ 2024/CVE-2024-12404.json | 33 +++++++++++ 2024/CVE-2024-12535.json | 33 +++++++++++ 2024/CVE-2024-21887.json | 31 ++++++++++ 2024/CVE-2024-32002.json | 12 ++-- 2024/CVE-2024-35250.json | 4 +- 2024/CVE-2024-3605.json | 33 +++++++++++ 2024/CVE-2024-38063.json | 8 +-- 2024/CVE-2024-44083.json | 8 +-- 2024/CVE-2024-49112.json | 8 +-- 2024/CVE-2024-49113.json | 8 +-- 2024/CVE-2024-4956.json | 4 +- 2024/CVE-2024-49699.json | 33 +++++++++++ 2024/CVE-2024-50379.json | 8 +-- 2024/CVE-2024-50491.json | 33 +++++++++++ 2024/CVE-2024-5124.json | 8 +-- 2024/CVE-2024-51818.json | 33 +++++++++++ 2024/CVE-2024-53376.json | 8 +-- 2024/CVE-2024-54292.json | 33 +++++++++++ 2024/CVE-2024-54498.json | 8 +-- 2024/CVE-2024-56058.json | 33 +++++++++++ 2024/CVE-2024-56059.json | 33 +++++++++++ 2024/CVE-2024-56064.json | 33 +++++++++++ 2024/CVE-2024-56067.json | 33 +++++++++++ 2024/CVE-2024-56145.json | 8 +-- 2024/CVE-2024-5764.json | 4 +- 2024/CVE-2024-9465.json | 8 +-- 2025/CVE-2025-0282.json | 47 ++++++++++++--- README.md | 122 +++++++++++++++++++++++++++++++++++---- 56 files changed, 889 insertions(+), 455 deletions(-) create mode 100644 2023/CVE-2023-32590.json create mode 100644 2024/CVE-2024-10571.json create mode 100644 2024/CVE-2024-11396.json create mode 100644 2024/CVE-2024-12157.json create mode 100644 2024/CVE-2024-12252.json create mode 100644 2024/CVE-2024-12404.json create mode 100644 2024/CVE-2024-12535.json create mode 100644 2024/CVE-2024-3605.json create mode 100644 2024/CVE-2024-49699.json create mode 100644 2024/CVE-2024-50491.json create mode 100644 2024/CVE-2024-51818.json create mode 100644 2024/CVE-2024-54292.json create mode 100644 2024/CVE-2024-56058.json create mode 100644 2024/CVE-2024-56059.json create mode 100644 2024/CVE-2024-56064.json create mode 100644 2024/CVE-2024-56067.json diff --git a/2007/CVE-2007-2447.json b/2007/CVE-2007-2447.json index 3c169372c2..afb80f2d18 100644 --- a/2007/CVE-2007-2447.json +++ b/2007/CVE-2007-2447.json @@ -526,37 +526,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 479844525, - "name": "CVE-2007-2447", - "full_name": "banomaly\/CVE-2007-2447", - "owner": { - "login": "banomaly", - "id": 51972282, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972282?v=4", - "html_url": "https:\/\/github.com\/banomaly", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/banomaly\/CVE-2007-2447", - "description": null, - "fork": false, - "created_at": "2022-04-09T21:12:11Z", - "updated_at": "2022-04-09T21:12:43Z", - "pushed_at": "2024-07-09T18:10:17Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 490631750, "name": "Samba-Usermap-exploit", @@ -928,5 +897,36 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 826416402, + "name": "CVE-2007-2447", + "full_name": "foudadev\/CVE-2007-2447", + "owner": { + "login": "foudadev", + "id": 40678747, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40678747?v=4", + "html_url": "https:\/\/github.com\/foudadev", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/foudadev\/CVE-2007-2447", + "description": null, + "fork": false, + "created_at": "2024-07-09T17:04:54Z", + "updated_at": "2024-07-09T17:04:54Z", + "pushed_at": "2024-07-09T17:05:32Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2009/CVE-2009-2265.json b/2009/CVE-2009-2265.json index e444bad506..f640d31bb0 100644 --- a/2009/CVE-2009-2265.json +++ b/2009/CVE-2009-2265.json @@ -99,37 +99,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 476225528, - "name": "CVE-2009-2265", - "full_name": "banomaly\/CVE-2009-2265", - "owner": { - "login": "banomaly", - "id": 51972282, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972282?v=4", - "html_url": "https:\/\/github.com\/banomaly", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/banomaly\/CVE-2009-2265", - "description": "ColdFusion 8.0.1 - Arbitrary File Upload to RCE", - "fork": false, - "created_at": "2022-03-31T08:52:08Z", - "updated_at": "2023-01-29T06:58:32Z", - "pushed_at": "2022-04-14T02:55:54Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - }, { "id": 905388637, "name": "Adobe-ColdFusion-8-RCE-CVE-2009-2265", diff --git a/2012/CVE-2012-4869.json b/2012/CVE-2012-4869.json index a24c83b3d2..1e57608073 100644 --- a/2012/CVE-2012-4869.json +++ b/2012/CVE-2012-4869.json @@ -29,36 +29,5 @@ "watchers": 0, "score": 0, "subscribers_count": 2 - }, - { - "id": 478822980, - "name": "CVE-2012-4869", - "full_name": "banomaly\/CVE-2012-4869", - "owner": { - "login": "banomaly", - "id": 51972282, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972282?v=4", - "html_url": "https:\/\/github.com\/banomaly", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/banomaly\/CVE-2012-4869", - "description": null, - "fork": false, - "created_at": "2022-04-07T04:13:13Z", - "updated_at": "2024-10-03T05:16:14Z", - "pushed_at": "2022-04-14T02:56:12Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2014/CVE-2014-3566.json b/2014/CVE-2014-3566.json index 5b7ef469fd..1a77995875 100644 --- a/2014/CVE-2014-3566.json +++ b/2014/CVE-2014-3566.json @@ -182,7 +182,7 @@ "fork": false, "created_at": "2024-11-14T04:35:59Z", "updated_at": "2025-01-05T15:26:10Z", - "pushed_at": "2025-01-13T19:05:30Z", + "pushed_at": "2025-01-14T12:58:33Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2014/CVE-2014-6271.json b/2014/CVE-2014-6271.json index 281f9115b5..c0973bec7f 100644 --- a/2014/CVE-2014-6271.json +++ b/2014/CVE-2014-6271.json @@ -1917,37 +1917,6 @@ "score": 0, "subscribers_count": 2 }, - { - "id": 479846687, - "name": "CVE-2014-6271", - "full_name": "banomaly\/CVE-2014-6271", - "owner": { - "login": "banomaly", - "id": 51972282, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972282?v=4", - "html_url": "https:\/\/github.com\/banomaly", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/banomaly\/CVE-2014-6271", - "description": null, - "fork": false, - "created_at": "2022-04-09T21:24:12Z", - "updated_at": "2022-04-09T21:24:47Z", - "pushed_at": "2022-04-14T02:56:49Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 506769957, "name": "cgi-bin-shellshock", diff --git a/2015/CVE-2015-1328.json b/2015/CVE-2015-1328.json index d1c1c018c0..f5e7d4d287 100644 --- a/2015/CVE-2015-1328.json +++ b/2015/CVE-2015-1328.json @@ -76,8 +76,8 @@ "description": "kernel exploit", "fork": false, "created_at": "2022-02-07T10:52:51Z", - "updated_at": "2025-01-11T23:46:45Z", - "pushed_at": "2022-02-07T14:33:56Z", + "updated_at": "2025-01-14T12:55:49Z", + "pushed_at": "2025-01-14T12:55:45Z", "stargazers_count": 9, "watchers_count": 9, "has_discussions": false, diff --git a/2015/CVE-2015-6967.json b/2015/CVE-2015-6967.json index 02cdeb8dbc..d65b6b0420 100644 --- a/2015/CVE-2015-6967.json +++ b/2015/CVE-2015-6967.json @@ -30,37 +30,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 481433279, - "name": "CVE-2015-6967", - "full_name": "banomaly\/CVE-2015-6967", - "owner": { - "login": "banomaly", - "id": 51972282, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972282?v=4", - "html_url": "https:\/\/github.com\/banomaly", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/banomaly\/CVE-2015-6967", - "description": null, - "fork": false, - "created_at": "2022-04-14T01:57:39Z", - "updated_at": "2024-08-19T17:35:43Z", - "pushed_at": "2022-04-14T02:59:42Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 4, - "score": 0, - "subscribers_count": 1 - }, { "id": 658921245, "name": "CVE-2015-6967", diff --git a/2017/CVE-2017-5638.json b/2017/CVE-2017-5638.json index 58ff571a15..df81b5feab 100644 --- a/2017/CVE-2017-5638.json +++ b/2017/CVE-2017-5638.json @@ -2068,37 +2068,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 481444491, - "name": "CVE-2017-5638", - "full_name": "banomaly\/CVE-2017-5638", - "owner": { - "login": "banomaly", - "id": 51972282, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972282?v=4", - "html_url": "https:\/\/github.com\/banomaly", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/banomaly\/CVE-2017-5638", - "description": null, - "fork": false, - "created_at": "2022-04-14T02:48:22Z", - "updated_at": "2024-07-01T10:35:27Z", - "pushed_at": "2022-04-14T02:52:51Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, { "id": 580942836, "name": "Exploit-CVE-2017-5638", diff --git a/2018/CVE-2018-7600.json b/2018/CVE-2018-7600.json index b050f27504..5e2cad290f 100644 --- a/2018/CVE-2018-7600.json +++ b/2018/CVE-2018-7600.json @@ -989,37 +989,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 477484512, - "name": "CVE-2018-7600", - "full_name": "banomaly\/CVE-2018-7600", - "owner": { - "login": "banomaly", - "id": 51972282, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972282?v=4", - "html_url": "https:\/\/github.com\/banomaly", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/banomaly\/CVE-2018-7600", - "description": null, - "fork": false, - "created_at": "2022-04-03T22:45:53Z", - "updated_at": "2023-03-13T21:35:37Z", - "pushed_at": "2022-04-14T02:56:03Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, { "id": 485290659, "name": "CVE-2018-7600", diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index f70380a7cf..fca43a1e83 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -1902,10 +1902,10 @@ "description": "Proof of concept for CVE-2019-0708", "fork": false, "created_at": "2019-05-29T16:53:54Z", - "updated_at": "2025-01-07T11:26:39Z", + "updated_at": "2025-01-14T12:14:41Z", "pushed_at": "2021-12-02T12:00:46Z", - "stargazers_count": 1175, - "watchers_count": 1175, + "stargazers_count": 1176, + "watchers_count": 1176, "has_discussions": false, "forks_count": 345, "allow_forking": true, @@ -1914,7 +1914,7 @@ "topics": [], "visibility": "public", "forks": 345, - "watchers": 1175, + "watchers": 1176, "score": 0, "subscribers_count": 69 }, @@ -2497,10 +2497,10 @@ "description": "Public work for CVE-2019-0708", "fork": false, "created_at": "2019-07-23T03:15:53Z", - "updated_at": "2024-08-24T09:50:01Z", + "updated_at": "2025-01-14T12:19:03Z", "pushed_at": "2019-11-19T02:43:38Z", - "stargazers_count": 289, - "watchers_count": 289, + "stargazers_count": 290, + "watchers_count": 290, "has_discussions": false, "forks_count": 91, "allow_forking": true, @@ -2509,7 +2509,7 @@ "topics": [], "visibility": "public", "forks": 91, - "watchers": 289, + "watchers": 290, "score": 0, "subscribers_count": 21 }, @@ -2962,10 +2962,10 @@ "description": "ispy V1.0 - Eternalblue(ms17-010)\/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )", "fork": false, "created_at": "2019-09-30T19:46:21Z", - "updated_at": "2024-11-04T16:40:49Z", + "updated_at": "2025-01-14T12:23:12Z", "pushed_at": "2021-02-06T00:24:21Z", - "stargazers_count": 234, - "watchers_count": 234, + "stargazers_count": 235, + "watchers_count": 235, "has_discussions": false, "forks_count": 74, "allow_forking": true, @@ -2974,7 +2974,7 @@ "topics": [], "visibility": "public", "forks": 74, - "watchers": 234, + "watchers": 235, "score": 0, "subscribers_count": 22 }, @@ -3024,10 +3024,10 @@ "description": "CVE-2019-0708 (BlueKeep)", "fork": false, "created_at": "2019-12-07T10:13:11Z", - "updated_at": "2024-12-25T11:28:16Z", + "updated_at": "2025-01-14T12:19:27Z", "pushed_at": "2020-07-07T15:28:13Z", - "stargazers_count": 105, - "watchers_count": 105, + "stargazers_count": 106, + "watchers_count": 106, "has_discussions": false, "forks_count": 23, "allow_forking": true, @@ -3036,7 +3036,7 @@ "topics": [], "visibility": "public", "forks": 23, - "watchers": 105, + "watchers": 106, "score": 0, "subscribers_count": 5 }, diff --git a/2019/CVE-2019-11447.json b/2019/CVE-2019-11447.json index b1aec63fc7..d62dc54756 100644 --- a/2019/CVE-2019-11447.json +++ b/2019/CVE-2019-11447.json @@ -171,37 +171,6 @@ "score": 0, "subscribers_count": 3 }, - { - "id": 481430471, - "name": "CVE-2019-11447", - "full_name": "banomaly\/CVE-2019-11447", - "owner": { - "login": "banomaly", - "id": 51972282, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972282?v=4", - "html_url": "https:\/\/github.com\/banomaly", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/banomaly\/CVE-2019-11447", - "description": null, - "fork": false, - "created_at": "2022-04-14T01:45:04Z", - "updated_at": "2022-04-14T01:56:44Z", - "pushed_at": "2022-04-14T02:52:39Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 736750785, "name": "CVE-2019-11447_reverse_shell_upload", diff --git a/2019/CVE-2019-1253.json b/2019/CVE-2019-1253.json index ef7c9da808..9b822eda70 100644 --- a/2019/CVE-2019-1253.json +++ b/2019/CVE-2019-1253.json @@ -107,10 +107,10 @@ "description": "AppXSvc Arbitrary File Security Descriptor Overwrite EoP", "fork": false, "created_at": "2019-09-11T23:28:59Z", - "updated_at": "2024-08-12T19:52:55Z", + "updated_at": "2025-01-14T18:02:41Z", "pushed_at": "2019-09-15T17:09:51Z", - "stargazers_count": 19, - "watchers_count": 19, + "stargazers_count": 20, + "watchers_count": 20, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -126,7 +126,7 @@ ], "visibility": "public", "forks": 5, - "watchers": 19, + "watchers": 20, "score": 0, "subscribers_count": 2 } diff --git a/2019/CVE-2019-16113.json b/2019/CVE-2019-16113.json index 3055d1422c..629e2a6477 100644 --- a/2019/CVE-2019-16113.json +++ b/2019/CVE-2019-16113.json @@ -155,35 +155,35 @@ "subscribers_count": 0 }, { - "id": 300985470, + "id": 302162339, "name": "CVE-2019-16113", - "full_name": "banomaly\/CVE-2019-16113", + "full_name": "m4rm0k\/CVE-2019-16113", "owner": { - "login": "banomaly", - "id": 51972282, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972282?v=4", - "html_url": "https:\/\/github.com\/banomaly", + "login": "m4rm0k", + "id": 3755563, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3755563?v=4", + "html_url": "https:\/\/github.com\/m4rm0k", "user_view_type": "public" }, - "html_url": "https:\/\/github.com\/banomaly\/CVE-2019-16113", + "html_url": "https:\/\/github.com\/m4rm0k\/CVE-2019-16113", "description": "Bludit 3.9.2 - Remote command execution - CVE-2019-16113", "fork": false, - "created_at": "2020-10-03T21:38:39Z", - "updated_at": "2024-10-24T22:21:49Z", - "pushed_at": "2020-10-12T19:01:20Z", - "stargazers_count": 3, - "watchers_count": 3, + "created_at": "2020-10-07T21:16:53Z", + "updated_at": "2020-10-07T21:16:55Z", + "pushed_at": "2020-10-03T21:48:34Z", + "stargazers_count": 0, + "watchers_count": 0, "has_discussions": false, - "forks_count": 3, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 3, - "watchers": 3, + "forks": 2, + "watchers": 0, "score": 0, - "subscribers_count": 2 + "subscribers_count": 0 }, { "id": 336189382, @@ -216,37 +216,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 478819535, - "name": "CVE-2019-16113_", - "full_name": "banomaly\/CVE-2019-16113_", - "owner": { - "login": "banomaly", - "id": 51972282, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972282?v=4", - "html_url": "https:\/\/github.com\/banomaly", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/banomaly\/CVE-2019-16113_", - "description": null, - "fork": false, - "created_at": "2022-04-07T03:57:15Z", - "updated_at": "2024-10-17T07:18:21Z", - "pushed_at": "2022-04-14T02:56:20Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, { "id": 778977291, "name": "CVE-2019-16113", diff --git a/2021/CVE-2021-24155.json b/2021/CVE-2021-24155.json index 0fbacf9f85..79b4710e44 100644 --- a/2021/CVE-2021-24155.json +++ b/2021/CVE-2021-24155.json @@ -14,10 +14,10 @@ "description": "WordPress Backup Guard Authenticated Remote Code Execution Exploit", "fork": false, "created_at": "2021-07-30T11:28:53Z", - "updated_at": "2024-08-12T20:15:08Z", + "updated_at": "2025-01-14T15:04:50Z", "pushed_at": "2021-07-30T11:35:54Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 11, + "watchers_count": 11, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 10, + "watchers": 11, "score": 0, "subscribers_count": 1 } diff --git a/2021/CVE-2021-3560.json b/2021/CVE-2021-3560.json index 28516185d2..cf0f83ceb4 100644 --- a/2021/CVE-2021-3560.json +++ b/2021/CVE-2021-3560.json @@ -333,10 +333,10 @@ "description": "Polkit D-Bus Authentication Bypass Exploit", "fork": false, "created_at": "2021-07-30T11:41:34Z", - "updated_at": "2024-08-12T20:15:08Z", + "updated_at": "2025-01-14T15:04:50Z", "pushed_at": "2021-07-30T11:43:32Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -345,7 +345,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 9, + "watchers": 10, "score": 0, "subscribers_count": 1 }, diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json index 0e7c3ae88f..8bca314a94 100644 --- a/2021/CVE-2021-40444.json +++ b/2021/CVE-2021-40444.json @@ -231,10 +231,10 @@ "description": "CVE-2021-40444 PoC", "fork": false, "created_at": "2021-09-10T16:55:53Z", - "updated_at": "2025-01-13T00:52:10Z", + "updated_at": "2025-01-14T13:26:52Z", "pushed_at": "2021-12-25T18:31:02Z", - "stargazers_count": 1609, - "watchers_count": 1609, + "stargazers_count": 1610, + "watchers_count": 1610, "has_discussions": false, "forks_count": 481, "allow_forking": true, @@ -243,7 +243,7 @@ "topics": [], "visibility": "public", "forks": 481, - "watchers": 1609, + "watchers": 1610, "score": 0, "subscribers_count": 28 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 4b1c554853..3fdfcce5ce 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -9179,43 +9179,6 @@ "score": 0, "subscribers_count": 2 }, - { - "id": 440154999, - "name": "log4j-dork-scanner", - "full_name": "cergo123\/log4j-dork-scanner", - "owner": { - "login": "cergo123", - "id": 41321155, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41321155?v=4", - "html_url": "https:\/\/github.com\/cergo123", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/cergo123\/log4j-dork-scanner", - "description": "A script to search, scrape and scan for Apache Log4j CVE-2021-44228 affected files using Google dorks", - "fork": false, - "created_at": "2021-12-20T12:01:52Z", - "updated_at": "2024-08-23T22:44:57Z", - "pushed_at": "2021-12-20T12:03:48Z", - "stargazers_count": 8, - "watchers_count": 8, - "has_discussions": false, - "forks_count": 7, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2021-44228", - "dork-scanner", - "log4j", - "python-script", - "scanner" - ], - "visibility": "public", - "forks": 7, - "watchers": 8, - "score": 0, - "subscribers_count": 2 - }, { "id": 440177006, "name": "log4shell-war-fixer", diff --git a/2022/CVE-2022-24706.json b/2022/CVE-2022-24706.json index 1e673f2eff..85018fa315 100644 --- a/2022/CVE-2022-24706.json +++ b/2022/CVE-2022-24706.json @@ -19,13 +19,13 @@ "stargazers_count": 30, "watchers_count": 30, "has_discussions": false, - "forks_count": 9, + "forks_count": 8, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 9, + "forks": 8, "watchers": 30, "score": 0, "subscribers_count": 1 diff --git a/2022/CVE-2022-38694.json b/2022/CVE-2022-38694.json index a90c1900ed..81c0720073 100644 --- a/2022/CVE-2022-38694.json +++ b/2022/CVE-2022-38694.json @@ -19,7 +19,7 @@ "stargazers_count": 320, "watchers_count": 320, "has_discussions": true, - "forks_count": 47, + "forks_count": 48, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -28,7 +28,7 @@ "unisoc" ], "visibility": "public", - "forks": 47, + "forks": 48, "watchers": 320, "score": 0, "subscribers_count": 8 diff --git a/2023/CVE-2023-28252.json b/2023/CVE-2023-28252.json index d472e00351..5d37e6e520 100644 --- a/2023/CVE-2023-28252.json +++ b/2023/CVE-2023-28252.json @@ -138,10 +138,10 @@ "description": "A modification to fortra's CVE-2023-28252 exploit, compiled to exe", "fork": false, "created_at": "2024-01-22T10:38:02Z", - "updated_at": "2025-01-02T22:31:57Z", + "updated_at": "2025-01-14T16:35:23Z", "pushed_at": "2024-01-24T13:45:56Z", - "stargazers_count": 53, - "watchers_count": 53, + "stargazers_count": 54, + "watchers_count": 54, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -150,7 +150,7 @@ "topics": [], "visibility": "public", "forks": 11, - "watchers": 53, + "watchers": 54, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-32590.json b/2023/CVE-2023-32590.json new file mode 100644 index 0000000000..4db510221e --- /dev/null +++ b/2023/CVE-2023-32590.json @@ -0,0 +1,33 @@ +[ + { + "id": 915586971, + "name": "CVE-2023-32590", + "full_name": "RandomRobbieBF\/CVE-2023-32590", + "owner": { + "login": "RandomRobbieBF", + "id": 51722811, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", + "html_url": "https:\/\/github.com\/RandomRobbieBF", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2023-32590", + "description": "Subscribe to Category <= 2.7.4 - Unauthenticated SQL Injection", + "fork": false, + "created_at": "2025-01-12T09:03:52Z", + "updated_at": "2025-01-14T12:42:54Z", + "pushed_at": "2025-01-12T09:04:39Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index 1c4c43d6c2..3971e339fd 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -14,10 +14,10 @@ "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "fork": false, "created_at": "2024-01-16T06:52:02Z", - "updated_at": "2025-01-14T00:54:58Z", + "updated_at": "2025-01-14T17:20:49Z", "pushed_at": "2024-08-18T08:26:46Z", - "stargazers_count": 1382, - "watchers_count": 1382, + "stargazers_count": 1384, + "watchers_count": 1384, "has_discussions": false, "forks_count": 238, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 238, - "watchers": 1382, + "watchers": 1384, "score": 0, "subscribers_count": 21 }, diff --git a/2023/CVE-2023-46805.json b/2023/CVE-2023-46805.json index 45655c8a51..ae82c322d5 100644 --- a/2023/CVE-2023-46805.json +++ b/2023/CVE-2023-46805.json @@ -255,5 +255,36 @@ "watchers": 2, "score": 0, "subscribers_count": 1 + }, + { + "id": 916614674, + "name": "pulse-meter", + "full_name": "rxwx\/pulse-meter", + "owner": { + "login": "rxwx", + "id": 2202542, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2202542?v=4", + "html_url": "https:\/\/github.com\/rxwx", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/rxwx\/pulse-meter", + "description": "Parses the System Snapshot from an Ivanti Connect Secure applicance to identify possible IOCs related to CVE-2023-46805, CVE-2024-21887 and CVE-2025-0282.", + "fork": false, + "created_at": "2025-01-14T12:54:19Z", + "updated_at": "2025-01-14T13:36:46Z", + "pushed_at": "2025-01-14T13:36:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-0044.json b/2024/CVE-2024-0044.json index a3e502d63f..fc27b02914 100644 --- a/2024/CVE-2024-0044.json +++ b/2024/CVE-2024-0044.json @@ -262,10 +262,10 @@ "description": "CVE-2024-0044", "fork": false, "created_at": "2024-08-19T02:51:14Z", - "updated_at": "2025-01-09T14:50:12Z", + "updated_at": "2025-01-14T13:34:13Z", "pushed_at": "2024-08-24T06:32:58Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -278,7 +278,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 6, + "watchers": 7, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-10571.json b/2024/CVE-2024-10571.json new file mode 100644 index 0000000000..5cde6e7cf3 --- /dev/null +++ b/2024/CVE-2024-10571.json @@ -0,0 +1,33 @@ +[ + { + "id": 916037793, + "name": "CVE-2024-10571", + "full_name": "RandomRobbieBF\/CVE-2024-10571", + "owner": { + "login": "RandomRobbieBF", + "id": 51722811, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", + "html_url": "https:\/\/github.com\/RandomRobbieBF", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-10571", + "description": "Chartify – WordPress Chart Plugin <= 2.9.5 - Unauthenticated Local File Inclusion via source", + "fork": false, + "created_at": "2025-01-13T10:38:31Z", + "updated_at": "2025-01-14T12:39:22Z", + "pushed_at": "2025-01-13T10:38:55Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-11396.json b/2024/CVE-2024-11396.json new file mode 100644 index 0000000000..199dcbd847 --- /dev/null +++ b/2024/CVE-2024-11396.json @@ -0,0 +1,33 @@ +[ + { + "id": 916075937, + "name": "CVE-2024-11396", + "full_name": "RandomRobbieBF\/CVE-2024-11396", + "owner": { + "login": "RandomRobbieBF", + "id": 51722811, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", + "html_url": "https:\/\/github.com\/RandomRobbieBF", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-11396", + "description": "Event monster <= 1.4.3 - Information Exposure Via Visitors List Export", + "fork": false, + "created_at": "2025-01-13T12:12:12Z", + "updated_at": "2025-01-14T12:38:39Z", + "pushed_at": "2025-01-13T12:12:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-12157.json b/2024/CVE-2024-12157.json new file mode 100644 index 0000000000..505a958a58 --- /dev/null +++ b/2024/CVE-2024-12157.json @@ -0,0 +1,33 @@ +[ + { + "id": 913334922, + "name": "CVE-2024-12157", + "full_name": "RandomRobbieBF\/CVE-2024-12157", + "owner": { + "login": "RandomRobbieBF", + "id": 51722811, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", + "html_url": "https:\/\/github.com\/RandomRobbieBF", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-12157", + "description": "Popup – MailChimp, GetResponse and ActiveCampaign Intergrations <= 3.2.6 - Unauthenticated SQL Injection", + "fork": false, + "created_at": "2025-01-07T13:40:05Z", + "updated_at": "2025-01-14T12:42:29Z", + "pushed_at": "2025-01-07T13:41:35Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-12252.json b/2024/CVE-2024-12252.json new file mode 100644 index 0000000000..0d0210e183 --- /dev/null +++ b/2024/CVE-2024-12252.json @@ -0,0 +1,33 @@ +[ + { + "id": 913410162, + "name": "CVE-2024-12252", + "full_name": "RandomRobbieBF\/CVE-2024-12252", + "owner": { + "login": "RandomRobbieBF", + "id": 51722811, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", + "html_url": "https:\/\/github.com\/RandomRobbieBF", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-12252", + "description": "SEO LAT Auto Post <= 2.2.1 - Missing Authorization to File Overwrite\/Upload (Remote Code Execution)", + "fork": false, + "created_at": "2025-01-07T16:22:35Z", + "updated_at": "2025-01-14T12:42:05Z", + "pushed_at": "2025-01-07T16:28:34Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-12404.json b/2024/CVE-2024-12404.json new file mode 100644 index 0000000000..1f9963cd02 --- /dev/null +++ b/2024/CVE-2024-12404.json @@ -0,0 +1,33 @@ +[ + { + "id": 914905137, + "name": "CVE-2024-12404", + "full_name": "RandomRobbieBF\/CVE-2024-12404", + "owner": { + "login": "RandomRobbieBF", + "id": 51722811, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", + "html_url": "https:\/\/github.com\/RandomRobbieBF", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-12404", + "description": "CF Internal Link Shortcode <= 1.1.0 - Unauthenticated SQL Injection", + "fork": false, + "created_at": "2025-01-10T14:52:22Z", + "updated_at": "2025-01-14T12:41:00Z", + "pushed_at": "2025-01-10T14:53:00Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-12535.json b/2024/CVE-2024-12535.json new file mode 100644 index 0000000000..70c9c52310 --- /dev/null +++ b/2024/CVE-2024-12535.json @@ -0,0 +1,33 @@ +[ + { + "id": 913375484, + "name": "CVE-2024-12535", + "full_name": "RandomRobbieBF\/CVE-2024-12535", + "owner": { + "login": "RandomRobbieBF", + "id": 51722811, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", + "html_url": "https:\/\/github.com\/RandomRobbieBF", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-12535", + "description": "Host PHP Info <= 1.0.4 - Missing Authorization to Unauthenticated Sensitive Information Disclosure", + "fork": false, + "created_at": "2025-01-07T15:08:14Z", + "updated_at": "2025-01-14T12:42:19Z", + "pushed_at": "2025-01-07T15:09:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-21887.json b/2024/CVE-2024-21887.json index c3d027af13..ac478db409 100644 --- a/2024/CVE-2024-21887.json +++ b/2024/CVE-2024-21887.json @@ -215,5 +215,36 @@ "watchers": 2, "score": 0, "subscribers_count": 1 + }, + { + "id": 916614674, + "name": "pulse-meter", + "full_name": "rxwx\/pulse-meter", + "owner": { + "login": "rxwx", + "id": 2202542, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2202542?v=4", + "html_url": "https:\/\/github.com\/rxwx", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/rxwx\/pulse-meter", + "description": "Parses the System Snapshot from an Ivanti Connect Secure applicance to identify possible IOCs related to CVE-2023-46805, CVE-2024-21887 and CVE-2025-0282.", + "fork": false, + "created_at": "2025-01-14T12:54:19Z", + "updated_at": "2025-01-14T13:36:46Z", + "pushed_at": "2025-01-14T13:36:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-32002.json b/2024/CVE-2024-32002.json index 2d9f670844..86c0c7dbfa 100644 --- a/2024/CVE-2024-32002.json +++ b/2024/CVE-2024-32002.json @@ -76,12 +76,12 @@ "description": "Exploit PoC for CVE-2024-32002", "fork": false, "created_at": "2024-05-17T19:33:08Z", - "updated_at": "2025-01-13T20:13:25Z", + "updated_at": "2025-01-14T14:41:23Z", "pushed_at": "2024-05-19T07:12:00Z", - "stargazers_count": 520, - "watchers_count": 520, + "stargazers_count": 521, + "watchers_count": 521, "has_discussions": false, - "forks_count": 146, + "forks_count": 147, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -92,8 +92,8 @@ "rce" ], "visibility": "public", - "forks": 146, - "watchers": 520, + "forks": 147, + "watchers": 521, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-35250.json b/2024/CVE-2024-35250.json index c370f1409f..799ce6eab9 100644 --- a/2024/CVE-2024-35250.json +++ b/2024/CVE-2024-35250.json @@ -111,8 +111,8 @@ "description": "CVE-2024-35250 PoC - Optimized & Condensed Form of Varwara's PoC", "fork": false, "created_at": "2025-01-13T18:24:48Z", - "updated_at": "2025-01-13T18:37:11Z", - "pushed_at": "2025-01-13T18:38:26Z", + "updated_at": "2025-01-14T16:51:38Z", + "pushed_at": "2025-01-14T16:51:35Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2024/CVE-2024-3605.json b/2024/CVE-2024-3605.json new file mode 100644 index 0000000000..cd82a0ea9a --- /dev/null +++ b/2024/CVE-2024-3605.json @@ -0,0 +1,33 @@ +[ + { + "id": 915570014, + "name": "CVE-2024-3605", + "full_name": "RandomRobbieBF\/CVE-2024-3605", + "owner": { + "login": "RandomRobbieBF", + "id": 51722811, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", + "html_url": "https:\/\/github.com\/RandomRobbieBF", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-3605", + "description": "WP Hotel Booking <= 2.1.0 - Unauthenticated SQL Injection", + "fork": false, + "created_at": "2025-01-12T07:53:02Z", + "updated_at": "2025-01-14T12:40:20Z", + "pushed_at": "2025-01-12T07:54:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-38063.json b/2024/CVE-2024-38063.json index 2080cb4dc0..afd5d1cde1 100644 --- a/2024/CVE-2024-38063.json +++ b/2024/CVE-2024-38063.json @@ -501,15 +501,15 @@ { "id": 851683675, "name": "Cve-2024-38063", - "full_name": "Brownpanda29\/Cve-2024-38063", + "full_name": "brownpanda29\/Cve-2024-38063", "owner": { - "login": "Brownpanda29", + "login": "brownpanda29", "id": 147920175, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/147920175?v=4", - "html_url": "https:\/\/github.com\/Brownpanda29", + "html_url": "https:\/\/github.com\/brownpanda29", "user_view_type": "public" }, - "html_url": "https:\/\/github.com\/Brownpanda29\/Cve-2024-38063", + "html_url": "https:\/\/github.com\/brownpanda29\/Cve-2024-38063", "description": null, "fork": false, "created_at": "2024-09-03T14:36:35Z", diff --git a/2024/CVE-2024-44083.json b/2024/CVE-2024-44083.json index bc021c8dbf..5c1c8fe348 100644 --- a/2024/CVE-2024-44083.json +++ b/2024/CVE-2024-44083.json @@ -14,10 +14,10 @@ "description": "Makes IDA (most versions) to crash upon opening it. ", "fork": false, "created_at": "2024-08-25T12:33:14Z", - "updated_at": "2025-01-09T06:39:31Z", + "updated_at": "2025-01-14T15:52:54Z", "pushed_at": "2024-08-30T09:58:12Z", - "stargazers_count": 76, - "watchers_count": 76, + "stargazers_count": 77, + "watchers_count": 77, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 76, + "watchers": 77, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-49112.json b/2024/CVE-2024-49112.json index e32abb2a5a..644b3eddc9 100644 --- a/2024/CVE-2024-49112.json +++ b/2024/CVE-2024-49112.json @@ -76,10 +76,10 @@ "description": "CVE-2024-49112 LDAP RCE PoC and Metasploit Module", "fork": false, "created_at": "2025-01-08T01:56:41Z", - "updated_at": "2025-01-11T05:59:03Z", + "updated_at": "2025-01-14T15:20:53Z", "pushed_at": "2025-01-11T05:59:00Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-49113.json b/2024/CVE-2024-49113.json index 55f3907446..1a0a0edae1 100644 --- a/2024/CVE-2024-49113.json +++ b/2024/CVE-2024-49113.json @@ -45,10 +45,10 @@ "description": null, "fork": false, "created_at": "2025-01-03T07:05:33Z", - "updated_at": "2025-01-13T09:53:17Z", + "updated_at": "2025-01-14T18:05:52Z", "pushed_at": "2025-01-03T08:20:03Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 8, + "watchers_count": 8, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 9, + "watchers": 8, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-4956.json b/2024/CVE-2024-4956.json index 3b8ceacfc8..22993706a0 100644 --- a/2024/CVE-2024-4956.json +++ b/2024/CVE-2024-4956.json @@ -384,13 +384,13 @@ "stargazers_count": 8, "watchers_count": 8, "has_discussions": false, - "forks_count": 2, + "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 2, + "forks": 3, "watchers": 8, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-49699.json b/2024/CVE-2024-49699.json new file mode 100644 index 0000000000..e7bc388fb9 --- /dev/null +++ b/2024/CVE-2024-49699.json @@ -0,0 +1,33 @@ +[ + { + "id": 914941212, + "name": "CVE-2024-49699", + "full_name": "RandomRobbieBF\/CVE-2024-49699", + "owner": { + "login": "RandomRobbieBF", + "id": 51722811, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", + "html_url": "https:\/\/github.com\/RandomRobbieBF", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-49699", + "description": "ARPrice <= 4.0.3 - Authenticated (Subscriber+) PHP Object Injection", + "fork": false, + "created_at": "2025-01-10T16:15:07Z", + "updated_at": "2025-01-14T12:40:49Z", + "pushed_at": "2025-01-10T16:18:05Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-50379.json b/2024/CVE-2024-50379.json index d75433daf7..8eb4b78211 100644 --- a/2024/CVE-2024-50379.json +++ b/2024/CVE-2024-50379.json @@ -262,10 +262,10 @@ "description": "CVE-2024-50379-exp", "fork": false, "created_at": "2024-12-25T02:41:31Z", - "updated_at": "2025-01-14T11:50:00Z", + "updated_at": "2025-01-14T18:05:32Z", "pushed_at": "2024-12-31T07:11:13Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -274,7 +274,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 8, + "watchers": 7, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-50491.json b/2024/CVE-2024-50491.json new file mode 100644 index 0000000000..bf70b6c134 --- /dev/null +++ b/2024/CVE-2024-50491.json @@ -0,0 +1,33 @@ +[ + { + "id": 915564003, + "name": "CVE-2024-50491", + "full_name": "RandomRobbieBF\/CVE-2024-50491", + "owner": { + "login": "RandomRobbieBF", + "id": 51722811, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", + "html_url": "https:\/\/github.com\/RandomRobbieBF", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-50491", + "description": "RSVP ME <= 1.9.9 - Unauthenticated SQL Injection", + "fork": false, + "created_at": "2025-01-12T07:26:48Z", + "updated_at": "2025-01-14T12:40:35Z", + "pushed_at": "2025-01-12T07:27:46Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-5124.json b/2024/CVE-2024-5124.json index adf4fde614..dd0a0210a4 100644 --- a/2024/CVE-2024-5124.json +++ b/2024/CVE-2024-5124.json @@ -45,10 +45,10 @@ "description": "CVE-2024-5124 poc", "fork": false, "created_at": "2024-12-03T03:18:48Z", - "updated_at": "2025-01-13T18:16:21Z", + "updated_at": "2025-01-14T18:04:03Z", "pushed_at": "2024-12-03T04:01:32Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 8, + "watchers": 7, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-51818.json b/2024/CVE-2024-51818.json new file mode 100644 index 0000000000..134c1413d6 --- /dev/null +++ b/2024/CVE-2024-51818.json @@ -0,0 +1,33 @@ +[ + { + "id": 914288330, + "name": "CVE-2024-51818", + "full_name": "RandomRobbieBF\/CVE-2024-51818", + "owner": { + "login": "RandomRobbieBF", + "id": 51722811, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", + "html_url": "https:\/\/github.com\/RandomRobbieBF", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-51818", + "description": "Fancy Product Designer <= 6.4.3 - Unauthenticated SQL Injection", + "fork": false, + "created_at": "2025-01-09T10:00:30Z", + "updated_at": "2025-01-14T12:41:40Z", + "pushed_at": "2025-01-09T10:01:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-53376.json b/2024/CVE-2024-53376.json index bb051d489d..c487e1c440 100644 --- a/2024/CVE-2024-53376.json +++ b/2024/CVE-2024-53376.json @@ -14,10 +14,10 @@ "description": "CyberPanel authenticated RCE < 2.3.8", "fork": false, "created_at": "2024-12-15T22:40:52Z", - "updated_at": "2025-01-09T08:56:12Z", + "updated_at": "2025-01-14T18:05:01Z", "pushed_at": "2024-12-19T09:36:58Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 7, + "watchers": 6, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-54292.json b/2024/CVE-2024-54292.json new file mode 100644 index 0000000000..5854f98d27 --- /dev/null +++ b/2024/CVE-2024-54292.json @@ -0,0 +1,33 @@ +[ + { + "id": 913434304, + "name": "CVE-2024-54292", + "full_name": "RandomRobbieBF\/CVE-2024-54292", + "owner": { + "login": "RandomRobbieBF", + "id": 51722811, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", + "html_url": "https:\/\/github.com\/RandomRobbieBF", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-54292", + "description": "Appsplate <= 2.1.3 - Unauthenticated SQL Injection", + "fork": false, + "created_at": "2025-01-07T17:14:57Z", + "updated_at": "2025-01-14T12:41:56Z", + "pushed_at": "2025-01-07T17:15:44Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-54498.json b/2024/CVE-2024-54498.json index 997658a3e4..e8a632020d 100644 --- a/2024/CVE-2024-54498.json +++ b/2024/CVE-2024-54498.json @@ -14,10 +14,10 @@ "description": "Escape macOS Sandbox using sharedfilelistd exploit", "fork": false, "created_at": "2025-01-08T09:55:44Z", - "updated_at": "2025-01-14T11:32:32Z", + "updated_at": "2025-01-14T18:13:40Z", "pushed_at": "2025-01-09T06:34:50Z", - "stargazers_count": 43, - "watchers_count": 43, + "stargazers_count": 45, + "watchers_count": 45, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 43, + "watchers": 45, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-56058.json b/2024/CVE-2024-56058.json new file mode 100644 index 0000000000..7245edc196 --- /dev/null +++ b/2024/CVE-2024-56058.json @@ -0,0 +1,33 @@ +[ + { + "id": 916058182, + "name": "CVE-2024-56058", + "full_name": "RandomRobbieBF\/CVE-2024-56058", + "owner": { + "login": "RandomRobbieBF", + "id": 51722811, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", + "html_url": "https:\/\/github.com\/RandomRobbieBF", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-56058", + "description": "VRPConnector <= 2.0.1 - Unauthenticated PHP Object Injection", + "fork": false, + "created_at": "2025-01-13T11:27:53Z", + "updated_at": "2025-01-14T12:39:13Z", + "pushed_at": "2025-01-13T11:30:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-56059.json b/2024/CVE-2024-56059.json new file mode 100644 index 0000000000..4994ebcb6e --- /dev/null +++ b/2024/CVE-2024-56059.json @@ -0,0 +1,33 @@ +[ + { + "id": 916073116, + "name": "CVE-2024-56059", + "full_name": "RandomRobbieBF\/CVE-2024-56059", + "owner": { + "login": "RandomRobbieBF", + "id": 51722811, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", + "html_url": "https:\/\/github.com\/RandomRobbieBF", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-56059", + "description": "Partners <= 0.2.0 - Unauthenticated PHP Object Injection", + "fork": false, + "created_at": "2025-01-13T12:05:21Z", + "updated_at": "2025-01-14T12:38:58Z", + "pushed_at": "2025-01-13T12:05:38Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-56064.json b/2024/CVE-2024-56064.json new file mode 100644 index 0000000000..d4db5469cc --- /dev/null +++ b/2024/CVE-2024-56064.json @@ -0,0 +1,33 @@ +[ + { + "id": 914434121, + "name": "CVE-2024-56064", + "full_name": "RandomRobbieBF\/CVE-2024-56064", + "owner": { + "login": "RandomRobbieBF", + "id": 51722811, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", + "html_url": "https:\/\/github.com\/RandomRobbieBF", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-56064", + "description": "WP SuperBackup <= 2.3.3 - Unauthenticated Arbitrary File Upload", + "fork": false, + "created_at": "2025-01-09T15:35:39Z", + "updated_at": "2025-01-14T12:41:11Z", + "pushed_at": "2025-01-09T15:36:32Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-56067.json b/2024/CVE-2024-56067.json new file mode 100644 index 0000000000..68f909f3e5 --- /dev/null +++ b/2024/CVE-2024-56067.json @@ -0,0 +1,33 @@ +[ + { + "id": 914305639, + "name": "CVE-2024-56067", + "full_name": "RandomRobbieBF\/CVE-2024-56067", + "owner": { + "login": "RandomRobbieBF", + "id": 51722811, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", + "html_url": "https:\/\/github.com\/RandomRobbieBF", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-56067", + "description": "WP SuperBackup <= 2.3.3 - Missing Authorization to Unauthenticated Back-Up File Download", + "fork": false, + "created_at": "2025-01-09T10:40:33Z", + "updated_at": "2025-01-14T12:41:21Z", + "pushed_at": "2025-01-09T10:42:05Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-56145.json b/2024/CVE-2024-56145.json index 8785843e66..31ab07a5f3 100644 --- a/2024/CVE-2024-56145.json +++ b/2024/CVE-2024-56145.json @@ -14,10 +14,10 @@ "description": "Unauthenticated RCE on CraftCMS when PHP `register_argc_argv` config setting is enabled", "fork": false, "created_at": "2024-12-20T03:34:01Z", - "updated_at": "2025-01-12T18:35:39Z", + "updated_at": "2025-01-14T18:05:18Z", "pushed_at": "2024-12-23T12:51:54Z", - "stargazers_count": 37, - "watchers_count": 37, + "stargazers_count": 36, + "watchers_count": 36, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 11, - "watchers": 37, + "watchers": 36, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-5764.json b/2024/CVE-2024-5764.json index 9c29888253..78e358676b 100644 --- a/2024/CVE-2024-5764.json +++ b/2024/CVE-2024-5764.json @@ -19,13 +19,13 @@ "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 2, "watchers": 0, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-9465.json b/2024/CVE-2024-9465.json index f48a5b5f60..9398713241 100644 --- a/2024/CVE-2024-9465.json +++ b/2024/CVE-2024-9465.json @@ -76,10 +76,10 @@ "description": "Proof of Concept Exploit for CVE-2024-9465", "fork": false, "created_at": "2024-12-03T12:16:44Z", - "updated_at": "2025-01-13T18:16:00Z", + "updated_at": "2025-01-14T18:04:05Z", "pushed_at": "2024-12-03T12:21:35Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 7, + "watchers": 6, "score": 0, "subscribers_count": 1 } diff --git a/2025/CVE-2025-0282.json b/2025/CVE-2025-0282.json index 311531aaa6..433258d4a8 100644 --- a/2025/CVE-2025-0282.json +++ b/2025/CVE-2025-0282.json @@ -45,10 +45,10 @@ "description": "Safely detect if an Ivanti server is vulnerable to CVE-2025-0282", "fork": false, "created_at": "2025-01-09T18:43:08Z", - "updated_at": "2025-01-13T22:15:51Z", + "updated_at": "2025-01-14T14:23:44Z", "pushed_at": "2025-01-10T21:27:47Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 5, + "watchers": 6, "score": 0, "subscribers_count": 0 }, @@ -107,10 +107,10 @@ "description": "CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit.", "fork": false, "created_at": "2025-01-11T02:06:51Z", - "updated_at": "2025-01-14T02:14:50Z", + "updated_at": "2025-01-14T15:03:56Z", "pushed_at": "2025-01-11T23:54:06Z", - "stargazers_count": 27, - "watchers_count": 27, + "stargazers_count": 28, + "watchers_count": 28, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 27, + "watchers": 28, "score": 0, "subscribers_count": 0 }, @@ -153,5 +153,36 @@ "watchers": 2, "score": 0, "subscribers_count": 0 + }, + { + "id": 916614674, + "name": "pulse-meter", + "full_name": "rxwx\/pulse-meter", + "owner": { + "login": "rxwx", + "id": 2202542, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2202542?v=4", + "html_url": "https:\/\/github.com\/rxwx", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/rxwx\/pulse-meter", + "description": "Parses the System Snapshot from an Ivanti Connect Secure applicance to identify possible IOCs related to CVE-2023-46805, CVE-2024-21887 and CVE-2025-0282.", + "fork": false, + "created_at": "2025-01-14T12:54:19Z", + "updated_at": "2025-01-14T13:36:46Z", + "pushed_at": "2025-01-14T13:36:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index 8c3adabe5a..9b59fced2b 100644 --- a/README.md +++ b/README.md @@ -11,6 +11,7 @@ - [NyxanGoat/CVE-2025-0282-PoC](https://github.com/NyxanGoat/CVE-2025-0282-PoC) - [absholi7ly/CVE-2025-0282-Ivanti-exploit](https://github.com/absholi7ly/CVE-2025-0282-Ivanti-exploit) - [AnonStorks/CVE-2025-0282-Full-version](https://github.com/AnonStorks/CVE-2025-0282-Full-version) +- [rxwx/pulse-meter](https://github.com/rxwx/pulse-meter) ### CVE-2025-22352 (2025-01-07) @@ -866,6 +867,13 @@ - [alperenugurlu/CVE-2024-3596-Detector](https://github.com/alperenugurlu/CVE-2024-3596-Detector) +### CVE-2024-3605 (2024-06-20) + +The WP Hotel Booking plugin for WordPress is vulnerable to SQL Injection via the 'room_type' parameter of the /wphb/v1/rooms/search-rooms REST API endpoint in all versions up to, and including, 2.1.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. + + +- [RandomRobbieBF/CVE-2024-3605](https://github.com/RandomRobbieBF/CVE-2024-3605) + ### CVE-2024-3656 (2024-10-09) A flaw was found in Keycloak. Certain endpoints in Keycloak's admin REST API allow low-privilege users to access administrative functionalities. This flaw allows users to perform actions reserved for administrators, potentially leading to data breaches or system compromise. @@ -2231,6 +2239,13 @@ - [bevennyamande/CVE-2024-10557](https://github.com/bevennyamande/CVE-2024-10557) +### CVE-2024-10571 (2024-11-14) + +The Chartify – WordPress Chart Plugin plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.9.5 via the 'source' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. + + +- [RandomRobbieBF/CVE-2024-10571](https://github.com/RandomRobbieBF/CVE-2024-10571) + ### CVE-2024-10586 (2024-11-09) The Debug Tool plugin for WordPress is vulnerable to arbitrary file creation due to a missing capability check on the dbt_pull_image() function and missing file type validation in all versions up to, and including, 2.2. This makes it possible for unauthenticated attackers to to create arbitrary files such as .php files that can be leveraged for remote code execution. @@ -2412,6 +2427,13 @@ - [Piyush-Bhor/CVE-2024-11394](https://github.com/Piyush-Bhor/CVE-2024-11394) +### CVE-2024-11396 (2025-01-13) + +The Event Monster – Event Management, Tickets Booking, Upcoming Event plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.4.3 via the Visitors List Export file. During the export, a CSV file is created in the wp-content folder with a hardcoded filename that is publicly accessible. This makes it possible for unauthenticated attackers to extract data about event visitors, that includes first and last names, email, and phone number. + + +- [RandomRobbieBF/CVE-2024-11396](https://github.com/RandomRobbieBF/CVE-2024-11396) + ### CVE-2024-11412 (2024-11-21) The Shine PDF Embeder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'shinepdf' shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. @@ -2503,6 +2525,13 @@ - [McTavishSue/CVE-2024-12155](https://github.com/McTavishSue/CVE-2024-12155) +### CVE-2024-12157 (2025-01-07) + +The Popup – MailChimp, GetResponse and ActiveCampaign Intergrations plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter of the 'upc_delete_db_record' AJAX action in all versions up to, and including, 3.2.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. + + +- [RandomRobbieBF/CVE-2024-12157](https://github.com/RandomRobbieBF/CVE-2024-12157) + ### CVE-2024-12172 (2024-12-12) The WP Courses LMS – Online Courses Builder, eLearning Courses, Courses Solution, Education Courses plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the wpc_update_user_meta_option() function in all versions up to, and including, 3.2.21. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary user's metadata which can be levereged to block an administrator from accessing their site when wp_capabilities is set to 0. @@ -2518,6 +2547,13 @@ - [RandomRobbieBF/CVE-2024-12209](https://github.com/RandomRobbieBF/CVE-2024-12209) - [Nxploited/CVE-2024-12209](https://github.com/Nxploited/CVE-2024-12209) +### CVE-2024-12252 (2025-01-07) + +The SEO LAT Auto Post plugin for WordPress is vulnerable to file overwrite due to a missing capability check on the remote_update AJAX action in all versions up to, and including, 2.2.1. This makes it possible for unauthenticated attackers to overwrite the seo-beginner-auto-post.php file which can be leveraged to achieve remote code execution. + + +- [RandomRobbieBF/CVE-2024-12252](https://github.com/RandomRobbieBF/CVE-2024-12252) + ### CVE-2024-12270 (2024-12-07) The Beautiful taxonomy filters plugin for WordPress is vulnerable to SQL Injection via the 'selects[0][term]' parameter in all versions up to, and including, 2.4.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. @@ -2528,6 +2564,13 @@ ### CVE-2024-12345 - [RoyaRadin/CVE-2024-12345-POC](https://github.com/RoyaRadin/CVE-2024-12345-POC) +### CVE-2024-12404 (2025-01-11) + +The CF Internal Link Shortcode plugin for WordPress is vulnerable to SQL Injection via the 'post_title' parameter in all versions up to, and including, 1.1.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. + + +- [RandomRobbieBF/CVE-2024-12404](https://github.com/RandomRobbieBF/CVE-2024-12404) + ### CVE-2024-12471 (2025-01-07) The Post Saint: ChatGPT, GPT4, DALL-E, Stable Diffusion, Pexels, Dezgo AI Text & Image Generator plugin for WordPress is vulnerable to arbitrary files uploads due to a missing capability check and file type validation on the add_image_to_library AJAX action function in all versions up to, and including, 1.3.1. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload arbitrary files that make remote code execution possible. @@ -2542,6 +2585,13 @@ - [LiChaser/CVE-2024-12484](https://github.com/LiChaser/CVE-2024-12484) +### CVE-2024-12535 (2025-01-07) + +The Host PHP Info plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check when including the 'phpinfo' function in all versions up to, and including, 1.0.4. This makes it possible for unauthenticated attackers to read configuration settings and predefined variables on the site's server. The plugin does not need to be activated for the vulnerability to be exploited. + + +- [RandomRobbieBF/CVE-2024-12535](https://github.com/RandomRobbieBF/CVE-2024-12535) + ### CVE-2024-12542 (2025-01-09) The linkID plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check when including the 'phpinfo' function in all versions up to, and including, 0.1.2. This makes it possible for unauthenticated attackers to read configuration settings and predefined variables on the site's server. The plugin does not need to be activated for the vulnerability to be exploited. @@ -2957,6 +3007,7 @@ - [seajaysec/Ivanti-Connect-Around-Scan](https://github.com/seajaysec/Ivanti-Connect-Around-Scan) - [mickdec/CVE-2023-46805_CVE-2024-21887_scan_grouped](https://github.com/mickdec/CVE-2023-46805_CVE-2024-21887_scan_grouped) - [tucommenceapousser/CVE-2024-21887](https://github.com/tucommenceapousser/CVE-2024-21887) +- [rxwx/pulse-meter](https://github.com/rxwx/pulse-meter) ### CVE-2024-21893 (2024-01-31) @@ -5891,7 +5942,7 @@ - [ThemeHackers/CVE-2024-38063](https://github.com/ThemeHackers/CVE-2024-38063) - [KernelKraze/CVE-2024-38063_PoC](https://github.com/KernelKraze/CVE-2024-38063_PoC) - [ps-interactive/cve-2024-38063](https://github.com/ps-interactive/cve-2024-38063) -- [Brownpanda29/Cve-2024-38063](https://github.com/Brownpanda29/Cve-2024-38063) +- [brownpanda29/Cve-2024-38063](https://github.com/brownpanda29/Cve-2024-38063) - [FrancescoDiSalesGithub/quick-fix-cve-2024-38063](https://github.com/FrancescoDiSalesGithub/quick-fix-cve-2024-38063) - [Faizan-Khanx/CVE-2024-38063](https://github.com/Faizan-Khanx/CVE-2024-38063) - [ArenaldyP/CVE-2024-38063-Medium](https://github.com/ArenaldyP/CVE-2024-38063-Medium) @@ -7441,6 +7492,9 @@ - [RandomRobbieBF/CVE-2024-49681](https://github.com/RandomRobbieBF/CVE-2024-49681) +### CVE-2024-49699 +- [RandomRobbieBF/CVE-2024-49699](https://github.com/RandomRobbieBF/CVE-2024-49699) + ### CVE-2024-50251 (2024-11-09) In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_payload: sanitize offset and length before calling skb_checksum()\n\nIf access to offset + length is larger than the skbuff length, then\nskb_checksum() triggers BUG_ON().\n\nskb_checksum() internally subtracts the length parameter while iterating\nover skbuff, BUG_ON(len) at the end of it checks that the expected\nlength to be included in the checksum calculation is fully consumed. @@ -7577,6 +7631,13 @@ - [RandomRobbieBF/CVE-2024-50490](https://github.com/RandomRobbieBF/CVE-2024-50490) +### CVE-2024-50491 (2024-10-28) + +Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Micah Blu RSVP ME allows SQL Injection.This issue affects RSVP ME: from n/a through 1.9.9. + + +- [RandomRobbieBF/CVE-2024-50491](https://github.com/RandomRobbieBF/CVE-2024-50491) + ### CVE-2024-50493 (2024-10-29) Unrestricted Upload of File with Dangerous Type vulnerability in masterhomepage Automatic Translation allows Upload a Web Shell to a Web Server.This issue affects Automatic Translation: from n/a through 1.0.4. @@ -7845,6 +7906,9 @@ - [l20170217b/CVE-2024-51747](https://github.com/l20170217b/CVE-2024-51747) +### CVE-2024-51818 +- [RandomRobbieBF/CVE-2024-51818](https://github.com/RandomRobbieBF/CVE-2024-51818) + ### CVE-2024-52002 (2024-11-08) Combodo iTop is a simple, web based IT Service Management tool. Several url endpoints are subject to a Cross-Site Request Forgery (CSRF) vulnerability. Please refer to the linked GHSA for the complete list. This issue has been addressed in version 3.2.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability. @@ -8049,6 +8113,13 @@ - [RandomRobbieBF/CVE-2024-54262](https://github.com/RandomRobbieBF/CVE-2024-54262) +### CVE-2024-54292 (2024-12-13) + +Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Appsplate Appsplate allows SQL Injection.This issue affects Appsplate: from n/a through 2.1.3. + + +- [RandomRobbieBF/CVE-2024-54292](https://github.com/RandomRobbieBF/CVE-2024-54292) + ### CVE-2024-54330 (2024-12-13) Server-Side Request Forgery (SSRF) vulnerability in Hep Hep Hurra (HHH) Hurrakify allows Server Side Request Forgery.This issue affects Hurrakify: from n/a through 2.4. @@ -8220,6 +8291,34 @@ - [RandomRobbieBF/CVE-2024-55988](https://github.com/RandomRobbieBF/CVE-2024-55988) +### CVE-2024-56058 (2024-12-18) + +Deserialization of Untrusted Data vulnerability in Gueststream VRPConnector allows Object Injection.This issue affects VRPConnector: from n/a through 2.0.1. + + +- [RandomRobbieBF/CVE-2024-56058](https://github.com/RandomRobbieBF/CVE-2024-56058) + +### CVE-2024-56059 (2024-12-18) + +Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') vulnerability in Mighty Digital Partners allows Object Injection.This issue affects Partners: from n/a through 0.2.0. + + +- [RandomRobbieBF/CVE-2024-56059](https://github.com/RandomRobbieBF/CVE-2024-56059) + +### CVE-2024-56064 (2024-12-31) + +Unrestricted Upload of File with Dangerous Type vulnerability in Azzaroco WP SuperBackup allows Upload a Web Shell to a Web Server.This issue affects WP SuperBackup: from n/a through 2.3.3. + + +- [RandomRobbieBF/CVE-2024-56064](https://github.com/RandomRobbieBF/CVE-2024-56064) + +### CVE-2024-56067 (2024-12-31) + +Missing Authorization vulnerability in Azzaroco WP SuperBackup allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP SuperBackup: from n/a through 2.3.3. + + +- [RandomRobbieBF/CVE-2024-56067](https://github.com/RandomRobbieBF/CVE-2024-56067) + ### CVE-2024-56115 (2024-12-18) A vulnerability in Amiro.CMS before 7.8.4 exists due to the failure to take measures to neutralize special elements. It allows remote attackers to conduct a Cross-Site Scripting (XSS) attack. @@ -12520,6 +12619,13 @@ - [Tris0n/CVE-2023-32571-POC](https://github.com/Tris0n/CVE-2023-32571-POC) - [vert16x/CVE-2023-32571-POC](https://github.com/vert16x/CVE-2023-32571-POC) +### CVE-2023-32590 (2023-12-20) + +Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Daniel Söderström / Sidney van de Stouwe Subscribe to Category.This issue affects Subscribe to Category: from n/a through 2.7.4.\n\n + + +- [RandomRobbieBF/CVE-2023-32590](https://github.com/RandomRobbieBF/CVE-2023-32590) + ### CVE-2023-32629 (2023-07-26) Local privilege escalation vulnerability in Ubuntu Kernels overlayfs ovl_copy_up_meta_inode_data skip permission checks when calling ovl_do_setxattr on Ubuntu kernels @@ -15733,6 +15839,7 @@ - [Chocapikk/CVE-2023-46805](https://github.com/Chocapikk/CVE-2023-46805) - [mickdec/CVE-2023-46805_CVE-2024-21887_scan_grouped](https://github.com/mickdec/CVE-2023-46805_CVE-2024-21887_scan_grouped) - [w2xim3/CVE-2023-46805](https://github.com/w2xim3/CVE-2023-46805) +- [rxwx/pulse-meter](https://github.com/rxwx/pulse-meter) ### CVE-2023-46813 (2023-10-27) @@ -29737,7 +29844,6 @@ - [TotallyNotAHaxxer/f-for-java](https://github.com/TotallyNotAHaxxer/f-for-java) - [spasam/log4j2-exploit](https://github.com/spasam/log4j2-exploit) - [bumheehan/cve-2021-44228-log4j-test](https://github.com/bumheehan/cve-2021-44228-log4j-test) -- [cergo123/log4j-dork-scanner](https://github.com/cergo123/log4j-dork-scanner) - [dmitsuo/log4shell-war-fixer](https://github.com/dmitsuo/log4shell-war-fixer) - [Y0-kan/Log4jShell-Scan](https://github.com/Y0-kan/Log4jShell-Scan) - [julian911015/Log4j-Scanner-Exploit](https://github.com/julian911015/Log4j-Scanner-Exploit) @@ -37766,7 +37872,6 @@ - [dinesh876/CVE-2019-11447-POC](https://github.com/dinesh876/CVE-2019-11447-POC) - [ColdFusionX/CVE-2019-11447_CuteNews-AvatarUploadRCE](https://github.com/ColdFusionX/CVE-2019-11447_CuteNews-AvatarUploadRCE) - [thewhiteh4t/cve-2019-11447](https://github.com/thewhiteh4t/cve-2019-11447) -- [banomaly/CVE-2019-11447](https://github.com/banomaly/CVE-2019-11447) - [substing/CVE-2019-11447_reverse_shell_upload](https://github.com/substing/CVE-2019-11447_reverse_shell_upload) - [CRFSlick/CVE-2019-11447-POC](https://github.com/CRFSlick/CVE-2019-11447-POC) - [ojo5/CVE-2019-11447.c](https://github.com/ojo5/CVE-2019-11447.c) @@ -38837,9 +38942,8 @@ - [hg8/CVE-2019-16113-PoC](https://github.com/hg8/CVE-2019-16113-PoC) - [Kenun99/CVE-2019-16113-Dockerfile](https://github.com/Kenun99/CVE-2019-16113-Dockerfile) - [dldygnl/CVE-2019-16113](https://github.com/dldygnl/CVE-2019-16113) -- [banomaly/CVE-2019-16113](https://github.com/banomaly/CVE-2019-16113) +- [m4rm0k/CVE-2019-16113](https://github.com/m4rm0k/CVE-2019-16113) - [DXY0411/CVE-2019-16113](https://github.com/DXY0411/CVE-2019-16113) -- [banomaly/CVE-2019-16113_](https://github.com/banomaly/CVE-2019-16113_) - [mind2hex/CVE-2019-16113](https://github.com/mind2hex/CVE-2019-16113) - [tronghoang89/cve-2019-16113](https://github.com/tronghoang89/cve-2019-16113) @@ -41012,7 +41116,6 @@ - [0xAJ2K/CVE-2018-7600](https://github.com/0xAJ2K/CVE-2018-7600) - [rafaelcaria/drupalgeddon2-CVE-2018-7600](https://github.com/rafaelcaria/drupalgeddon2-CVE-2018-7600) - [vphnguyen/ANM_CVE-2018-7600](https://github.com/vphnguyen/ANM_CVE-2018-7600) -- [banomaly/CVE-2018-7600](https://github.com/banomaly/CVE-2018-7600) - [anldori/CVE-2018-7600](https://github.com/anldori/CVE-2018-7600) - [r0lh/CVE-2018-7600](https://github.com/r0lh/CVE-2018-7600) - [killeveee/CVE-2018-7600](https://github.com/killeveee/CVE-2018-7600) @@ -43869,7 +43972,6 @@ - [testpilot031/vulnerability_struts-2.3.31](https://github.com/testpilot031/vulnerability_struts-2.3.31) - [readloud/CVE-2017-5638](https://github.com/readloud/CVE-2017-5638) - [Tankirat/CVE-2017-5638](https://github.com/Tankirat/CVE-2017-5638) -- [banomaly/CVE-2017-5638](https://github.com/banomaly/CVE-2017-5638) - [mfdev-solution/Exploit-CVE-2017-5638](https://github.com/mfdev-solution/Exploit-CVE-2017-5638) - [mritunjay-k/CVE-2017-5638](https://github.com/mritunjay-k/CVE-2017-5638) - [FredBrave/CVE-2017-5638-ApacheStruts2.3.5](https://github.com/FredBrave/CVE-2017-5638-ApacheStruts2.3.5) @@ -47701,7 +47803,6 @@ - [dix0nym/CVE-2015-6967](https://github.com/dix0nym/CVE-2015-6967) -- [banomaly/CVE-2015-6967](https://github.com/banomaly/CVE-2015-6967) - [FredBrave/CVE-2015-6967](https://github.com/FredBrave/CVE-2015-6967) - [3mpir3Albert/HTB_Nibbles](https://github.com/3mpir3Albert/HTB_Nibbles) @@ -48534,7 +48635,6 @@ - [b4keSn4ke/CVE-2014-6271](https://github.com/b4keSn4ke/CVE-2014-6271) - [hadrian3689/shellshock](https://github.com/hadrian3689/shellshock) - [akr3ch/CVE-2014-6271](https://github.com/akr3ch/CVE-2014-6271) -- [banomaly/CVE-2014-6271](https://github.com/banomaly/CVE-2014-6271) - [Gurguii/cgi-bin-shellshock](https://github.com/Gurguii/cgi-bin-shellshock) - [anujbhan/shellshock-victim-host](https://github.com/anujbhan/shellshock-victim-host) - [FilipStudeny/-CVE-2014-6271-Shellshock-Remote-Command-Injection-](https://github.com/FilipStudeny/-CVE-2014-6271-Shellshock-Remote-Command-Injection-) @@ -49409,7 +49509,6 @@ - [bitc0de/Elastix-Remote-Code-Execution](https://github.com/bitc0de/Elastix-Remote-Code-Execution) -- [banomaly/CVE-2012-4869](https://github.com/banomaly/CVE-2012-4869) ### CVE-2012-4929 (2012-09-15) @@ -49981,7 +50080,6 @@ - [zaphoxx/zaphoxx-coldfusion](https://github.com/zaphoxx/zaphoxx-coldfusion) - [n3rdh4x0r/CVE-2009-2265](https://github.com/n3rdh4x0r/CVE-2009-2265) - [p1ckzi/CVE-2009-2265](https://github.com/p1ckzi/CVE-2009-2265) -- [banomaly/CVE-2009-2265](https://github.com/banomaly/CVE-2009-2265) - [0xDTC/Adobe-ColdFusion-8-RCE-CVE-2009-2265](https://github.com/0xDTC/Adobe-ColdFusion-8-RCE-CVE-2009-2265) ### CVE-2009-2692 (2009-08-14) @@ -50266,7 +50364,6 @@ - [3t4n/samba-3.0.24-CVE-2007-2447-vunerable-](https://github.com/3t4n/samba-3.0.24-CVE-2007-2447-vunerable-) - [xbufu/CVE-2007-2447](https://github.com/xbufu/CVE-2007-2447) - [s4msec/CVE-2007-2447](https://github.com/s4msec/CVE-2007-2447) -- [banomaly/CVE-2007-2447](https://github.com/banomaly/CVE-2007-2447) - [Nosferatuvjr/Samba-Usermap-exploit](https://github.com/Nosferatuvjr/Samba-Usermap-exploit) - [testaross4/CVE-2007-2447](https://github.com/testaross4/CVE-2007-2447) - [mr-l0n3lly/CVE-2007-2447](https://github.com/mr-l0n3lly/CVE-2007-2447) @@ -50279,6 +50376,7 @@ - [ShivamDey/Samba-CVE-2007-2447-Exploit](https://github.com/ShivamDey/Samba-CVE-2007-2447-Exploit) - [Juantos/cve-2007-2447](https://github.com/Juantos/cve-2007-2447) - [IamLucif3r/CVE-2007-2447-Exploit](https://github.com/IamLucif3r/CVE-2007-2447-Exploit) +- [foudadev/CVE-2007-2447](https://github.com/foudadev/CVE-2007-2447) ### CVE-2007-3280 (2007-06-19)