From ca84934b585d0d6eb34ce68de17c9fed6e54be73 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Tue, 10 Dec 2024 15:32:43 +0900 Subject: [PATCH] Auto Update 2024/12/10 06:32:43 --- 2016/CVE-2016-5195.json | 4 ++-- 2018/CVE-2018-15133.json | 4 ++-- 2019/CVE-2019-2725.json | 8 ++++---- 2020/CVE-2020-0787.json | 8 ++++---- 2020/CVE-2020-1472.json | 8 ++++---- 2020/CVE-2020-7247.json | 4 ++-- 2021/CVE-2021-39433.json | 31 ------------------------------- 2021/CVE-2021-40444.json | 16 ++++++++-------- 2021/CVE-2021-40449.json | 4 ++-- 2021/CVE-2021-4045.json | 4 ++-- 2021/CVE-2021-42278.json | 8 ++++---- 2021/CVE-2021-44228.json | 39 +++++++++++++++++++++++++++++++++++---- 2022/CVE-2022-0847.json | 8 ++++---- 2022/CVE-2022-46689.json | 8 ++++---- 2023/CVE-2023-1389.json | 8 ++++---- 2023/CVE-2023-20198.json | 8 ++++---- 2023/CVE-2023-21768.json | 8 ++++---- 2023/CVE-2023-25690.json | 8 ++++---- 2023/CVE-2023-40031.json | 8 ++++---- 2024/CVE-2024-0044.json | 2 +- 2024/CVE-2024-11393.json | 8 ++++---- 2024/CVE-2024-11477.json | 8 ++++---- 2024/CVE-2024-11680.json | 8 ++++---- 2024/CVE-2024-12209.json | 2 +- 2024/CVE-2024-12270.json | 2 +- 2024/CVE-2024-20356.json | 8 ++++---- 2024/CVE-2024-21338.json | 8 ++++---- 2024/CVE-2024-21413.json | 8 ++++---- 2024/CVE-2024-22734.json | 8 ++++---- 2024/CVE-2024-23334.json | 2 +- 2024/CVE-2024-23346.json | 2 +- 2024/CVE-2024-24549.json | 10 +++++----- 2024/CVE-2024-38193.json | 12 ++++++------ 2024/CVE-2024-43160.json | 8 ++++---- 2024/CVE-2024-43918.json | 8 ++++---- 2024/CVE-2024-4577.json | 20 ++++++++++---------- 2024/CVE-2024-48990.json | 2 +- 2024/CVE-2024-52940.json | 8 ++++---- 2024/CVE-2024-6769.json | 8 ++++---- 2024/CVE-2024-9441.json | 2 +- README.md | 2 +- 41 files changed, 170 insertions(+), 170 deletions(-) diff --git a/2016/CVE-2016-5195.json b/2016/CVE-2016-5195.json index 3c1498dfce..1263b47132 100644 --- a/2016/CVE-2016-5195.json +++ b/2016/CVE-2016-5195.json @@ -467,7 +467,7 @@ "stargazers_count": 864, "watchers_count": 864, "has_discussions": false, - "forks_count": 428, + "forks_count": 426, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -477,7 +477,7 @@ "exploit" ], "visibility": "public", - "forks": 428, + "forks": 426, "watchers": 864, "score": 0, "subscribers_count": 9 diff --git a/2018/CVE-2018-15133.json b/2018/CVE-2018-15133.json index 6807258b65..c15305fab3 100644 --- a/2018/CVE-2018-15133.json +++ b/2018/CVE-2018-15133.json @@ -19,13 +19,13 @@ "stargazers_count": 248, "watchers_count": 248, "has_discussions": false, - "forks_count": 37, + "forks_count": 36, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 37, + "forks": 36, "watchers": 248, "score": 0, "subscribers_count": 6 diff --git a/2019/CVE-2019-2725.json b/2019/CVE-2019-2725.json index e6981a0034..4d73c6c318 100644 --- a/2019/CVE-2019-2725.json +++ b/2019/CVE-2019-2725.json @@ -231,10 +231,10 @@ "description": "CVE-2019-2725 命令回显", "fork": false, "created_at": "2019-05-29T01:57:05Z", - "updated_at": "2024-12-04T10:14:02Z", + "updated_at": "2024-12-10T04:01:54Z", "pushed_at": "2023-05-08T16:23:06Z", - "stargazers_count": 437, - "watchers_count": 437, + "stargazers_count": 438, + "watchers_count": 438, "has_discussions": false, "forks_count": 162, "allow_forking": true, @@ -243,7 +243,7 @@ "topics": [], "visibility": "public", "forks": 162, - "watchers": 437, + "watchers": 438, "score": 0, "subscribers_count": 9 }, diff --git a/2020/CVE-2020-0787.json b/2020/CVE-2020-0787.json index 4110c72542..9cebd14c09 100644 --- a/2020/CVE-2020-0787.json +++ b/2020/CVE-2020-0787.json @@ -14,10 +14,10 @@ "description": "Support ALL Windows Version", "fork": false, "created_at": "2020-06-16T08:57:51Z", - "updated_at": "2024-10-29T15:29:52Z", + "updated_at": "2024-12-10T05:19:06Z", "pushed_at": "2020-09-11T07:38:22Z", - "stargazers_count": 712, - "watchers_count": 712, + "stargazers_count": 713, + "watchers_count": 713, "has_discussions": false, "forks_count": 173, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 173, - "watchers": 712, + "watchers": 713, "score": 0, "subscribers_count": 19 }, diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index c6af87dc3d..e5d77f9a1e 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -45,10 +45,10 @@ "description": "Test tool for CVE-2020-1472", "fork": false, "created_at": "2020-09-08T08:58:37Z", - "updated_at": "2024-12-08T02:32:11Z", + "updated_at": "2024-12-10T04:10:22Z", "pushed_at": "2023-07-20T10:51:42Z", - "stargazers_count": 1738, - "watchers_count": 1738, + "stargazers_count": 1739, + "watchers_count": 1739, "has_discussions": false, "forks_count": 359, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 359, - "watchers": 1738, + "watchers": 1739, "score": 0, "subscribers_count": 86 }, diff --git a/2020/CVE-2020-7247.json b/2020/CVE-2020-7247.json index 80d3f2776a..af7bac44e4 100644 --- a/2020/CVE-2020-7247.json +++ b/2020/CVE-2020-7247.json @@ -19,13 +19,13 @@ "stargazers_count": 25, "watchers_count": 25, "has_discussions": false, - "forks_count": 16, + "forks_count": 14, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 16, + "forks": 14, "watchers": 25, "score": 0, "subscribers_count": 3 diff --git a/2021/CVE-2021-39433.json b/2021/CVE-2021-39433.json index 54f7bf9083..19fdf05940 100644 --- a/2021/CVE-2021-39433.json +++ b/2021/CVE-2021-39433.json @@ -29,36 +29,5 @@ "watchers": 6, "score": 0, "subscribers_count": 1 - }, - { - "id": 875359853, - "name": "CVE-2021-39433", - "full_name": "ibnurusdianto\/CVE-2021-39433", - "owner": { - "login": "ibnurusdianto", - "id": 43640284, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43640284?v=4", - "html_url": "https:\/\/github.com\/ibnurusdianto", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ibnurusdianto\/CVE-2021-39433", - "description": "Kerentanan ini merupakan jenis Local File Inclusion (LFI) yang terdapat pada versi BIQS IT Biqs-drive v1.83 dan di bawahnya. Kerentanan ini dapat dieksploitasi dengan mengirimkan payload tertentu sebagai parameter file ke download\/index.php", - "fork": false, - "created_at": "2024-10-19T19:04:27Z", - "updated_at": "2024-10-20T03:19:51Z", - "pushed_at": "2024-10-20T03:19:48Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json index 5759dc5b83..16fb55957b 100644 --- a/2021/CVE-2021-40444.json +++ b/2021/CVE-2021-40444.json @@ -231,10 +231,10 @@ "description": "CVE-2021-40444 PoC", "fork": false, "created_at": "2021-09-10T16:55:53Z", - "updated_at": "2024-12-06T12:17:35Z", + "updated_at": "2024-12-10T04:31:07Z", "pushed_at": "2021-12-25T18:31:02Z", - "stargazers_count": 1603, - "watchers_count": 1603, + "stargazers_count": 1604, + "watchers_count": 1604, "has_discussions": false, "forks_count": 482, "allow_forking": true, @@ -243,7 +243,7 @@ "topics": [], "visibility": "public", "forks": 482, - "watchers": 1603, + "watchers": 1604, "score": 0, "subscribers_count": 28 }, @@ -541,10 +541,10 @@ "description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit", "fork": false, "created_at": "2021-09-15T22:34:35Z", - "updated_at": "2024-11-11T02:10:31Z", + "updated_at": "2024-12-10T00:17:07Z", "pushed_at": "2023-10-11T18:44:51Z", - "stargazers_count": 800, - "watchers_count": 800, + "stargazers_count": 801, + "watchers_count": 801, "has_discussions": false, "forks_count": 170, "allow_forking": true, @@ -560,7 +560,7 @@ ], "visibility": "public", "forks": 170, - "watchers": 800, + "watchers": 801, "score": 0, "subscribers_count": 18 }, diff --git a/2021/CVE-2021-40449.json b/2021/CVE-2021-40449.json index 56e2770248..88ced52588 100644 --- a/2021/CVE-2021-40449.json +++ b/2021/CVE-2021-40449.json @@ -19,7 +19,7 @@ "stargazers_count": 463, "watchers_count": 463, "has_discussions": false, - "forks_count": 91, + "forks_count": 92, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -27,7 +27,7 @@ "cve-2021-40449" ], "visibility": "public", - "forks": 91, + "forks": 92, "watchers": 463, "score": 0, "subscribers_count": 13 diff --git a/2021/CVE-2021-4045.json b/2021/CVE-2021-4045.json index 635b1b457b..e944bd7c18 100644 --- a/2021/CVE-2021-4045.json +++ b/2021/CVE-2021-4045.json @@ -19,7 +19,7 @@ "stargazers_count": 72, "watchers_count": 72, "has_discussions": false, - "forks_count": 10, + "forks_count": 9, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -31,7 +31,7 @@ "wifi-camera" ], "visibility": "public", - "forks": 10, + "forks": 9, "watchers": 72, "score": 0, "subscribers_count": 2 diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json index 4cf6b75a72..7a42df28e0 100644 --- a/2021/CVE-2021-42278.json +++ b/2021/CVE-2021-42278.json @@ -14,10 +14,10 @@ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-11T15:10:30Z", - "updated_at": "2024-12-08T09:34:30Z", + "updated_at": "2024-12-10T00:50:46Z", "pushed_at": "2022-07-10T22:23:13Z", - "stargazers_count": 990, - "watchers_count": 990, + "stargazers_count": 991, + "watchers_count": 991, "has_discussions": false, "forks_count": 190, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 190, - "watchers": 990, + "watchers": 991, "score": 0, "subscribers_count": 24 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index f41403a5ee..5336675e3e 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -1467,10 +1467,10 @@ "description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228", "fork": false, "created_at": "2021-12-11T11:18:46Z", - "updated_at": "2024-11-12T20:26:27Z", + "updated_at": "2024-12-10T01:40:39Z", "pushed_at": "2022-04-07T14:47:03Z", - "stargazers_count": 852, - "watchers_count": 852, + "stargazers_count": 851, + "watchers_count": 851, "has_discussions": false, "forks_count": 173, "allow_forking": true, @@ -1492,7 +1492,7 @@ ], "visibility": "public", "forks": 173, - "watchers": 852, + "watchers": 851, "score": 0, "subscribers_count": 33 }, @@ -10710,6 +10710,37 @@ "score": 0, "subscribers_count": 1 }, + { + "id": 447404470, + "name": "log4shell", + "full_name": "jxerome\/log4shell", + "owner": { + "login": "jxerome", + "id": 1355634, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1355634?v=4", + "html_url": "https:\/\/github.com\/jxerome", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/jxerome\/log4shell", + "description": "Démo du fonctionnement de log4shell (CVE-2021-44228)", + "fork": false, + "created_at": "2022-01-12T23:44:20Z", + "updated_at": "2022-01-12T23:59:13Z", + "pushed_at": "2022-01-14T14:03:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 2 + }, { "id": 447754863, "name": "log4j_github_repository", diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index f148bbee16..c62806283f 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -1163,10 +1163,10 @@ "description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.", "fork": false, "created_at": "2022-03-12T20:57:24Z", - "updated_at": "2024-12-07T20:37:29Z", + "updated_at": "2024-12-10T01:23:32Z", "pushed_at": "2023-05-20T05:55:45Z", - "stargazers_count": 558, - "watchers_count": 558, + "stargazers_count": 557, + "watchers_count": 557, "has_discussions": false, "forks_count": 142, "allow_forking": true, @@ -1175,7 +1175,7 @@ "topics": [], "visibility": "public", "forks": 142, - "watchers": 558, + "watchers": 557, "score": 0, "subscribers_count": 15 }, diff --git a/2022/CVE-2022-46689.json b/2022/CVE-2022-46689.json index ea45472ed1..e036f2ae29 100644 --- a/2022/CVE-2022-46689.json +++ b/2022/CVE-2022-46689.json @@ -107,10 +107,10 @@ "description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.", "fork": false, "created_at": "2022-12-26T06:56:35Z", - "updated_at": "2024-12-04T06:54:46Z", + "updated_at": "2024-12-10T05:41:58Z", "pushed_at": "2023-08-02T09:35:14Z", - "stargazers_count": 884, - "watchers_count": 884, + "stargazers_count": 883, + "watchers_count": 883, "has_discussions": false, "forks_count": 73, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 73, - "watchers": 884, + "watchers": 883, "score": 0, "subscribers_count": 25 }, diff --git a/2023/CVE-2023-1389.json b/2023/CVE-2023-1389.json index 9a0be1f359..a1d19dd7a9 100644 --- a/2023/CVE-2023-1389.json +++ b/2023/CVE-2023-1389.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2023-07-28T03:09:00Z", - "updated_at": "2024-10-09T08:05:43Z", + "updated_at": "2024-12-10T02:59:17Z", "pushed_at": "2024-07-18T20:07:11Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 8, + "watchers": 9, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-20198.json b/2023/CVE-2023-20198.json index e9e360e450..787c18d412 100644 --- a/2023/CVE-2023-20198.json +++ b/2023/CVE-2023-20198.json @@ -798,10 +798,10 @@ "description": "CVE-2023-20198是思科IOS XE软件Web UI功能中的一个严重漏洞,允许未经身份验证的远程攻击者在受影响的系统上创建具有特权级别15的账户,从而完全控制设备。", "fork": false, "created_at": "2024-11-22T04:10:28Z", - "updated_at": "2024-12-08T18:37:34Z", + "updated_at": "2024-12-10T03:08:29Z", "pushed_at": "2024-11-22T04:12:11Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -810,7 +810,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 2 } diff --git a/2023/CVE-2023-21768.json b/2023/CVE-2023-21768.json index 5932869a9e..3b6a4bd34b 100644 --- a/2023/CVE-2023-21768.json +++ b/2023/CVE-2023-21768.json @@ -76,10 +76,10 @@ "description": "Using CVE-2023-21768 to manual map kernel mode driver ", "fork": false, "created_at": "2023-03-10T19:08:28Z", - "updated_at": "2024-11-30T14:21:20Z", + "updated_at": "2024-12-10T02:34:56Z", "pushed_at": "2023-03-10T20:16:53Z", - "stargazers_count": 175, - "watchers_count": 175, + "stargazers_count": 176, + "watchers_count": 176, "has_discussions": false, "forks_count": 35, "allow_forking": true, @@ -96,7 +96,7 @@ ], "visibility": "public", "forks": 35, - "watchers": 175, + "watchers": 176, "score": 0, "subscribers_count": 3 }, diff --git a/2023/CVE-2023-25690.json b/2023/CVE-2023-25690.json index 02512715f2..270ad98860 100644 --- a/2023/CVE-2023-25690.json +++ b/2023/CVE-2023-25690.json @@ -49,10 +49,10 @@ "description": "CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability.", "fork": false, "created_at": "2023-05-22T03:06:31Z", - "updated_at": "2024-12-05T17:13:39Z", + "updated_at": "2024-12-10T03:54:16Z", "pushed_at": "2024-08-24T13:38:50Z", - "stargazers_count": 270, - "watchers_count": 270, + "stargazers_count": 271, + "watchers_count": 271, "has_discussions": false, "forks_count": 36, "allow_forking": true, @@ -69,7 +69,7 @@ ], "visibility": "public", "forks": 36, - "watchers": 270, + "watchers": 271, "score": 0, "subscribers_count": 4 }, diff --git a/2023/CVE-2023-40031.json b/2023/CVE-2023-40031.json index 60515153b9..69d73db2b2 100644 --- a/2023/CVE-2023-40031.json +++ b/2023/CVE-2023-40031.json @@ -14,10 +14,10 @@ "description": "notepad++堆缓冲区溢出漏洞CVE-2023-40031 分析与复现", "fork": false, "created_at": "2023-09-08T05:43:12Z", - "updated_at": "2024-10-28T16:18:44Z", + "updated_at": "2024-12-10T02:18:01Z", "pushed_at": "2023-09-08T05:48:52Z", - "stargazers_count": 14, - "watchers_count": 14, + "stargazers_count": 15, + "watchers_count": 15, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 14, + "watchers": 15, "score": 0, "subscribers_count": 2 } diff --git a/2024/CVE-2024-0044.json b/2024/CVE-2024-0044.json index e3a63c753f..079fe9d060 100644 --- a/2024/CVE-2024-0044.json +++ b/2024/CVE-2024-0044.json @@ -342,6 +342,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-11393.json b/2024/CVE-2024-11393.json index 692ea56513..24ab1d12cc 100644 --- a/2024/CVE-2024-11393.json +++ b/2024/CVE-2024-11393.json @@ -14,10 +14,10 @@ "description": "Technical Details and Exploit for CVE-2024-11393", "fork": false, "created_at": "2024-12-07T11:24:06Z", - "updated_at": "2024-12-09T17:16:32Z", + "updated_at": "2024-12-10T04:18:23Z", "pushed_at": "2024-12-08T00:31:25Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-11477.json b/2024/CVE-2024-11477.json index b6fed2f03a..7ce7967a45 100644 --- a/2024/CVE-2024-11477.json +++ b/2024/CVE-2024-11477.json @@ -14,10 +14,10 @@ "description": "CVE-2024-11477 7Zip Code Execution Writeup and Analysis", "fork": false, "created_at": "2024-11-29T06:13:36Z", - "updated_at": "2024-12-06T03:59:20Z", + "updated_at": "2024-12-10T03:31:43Z", "pushed_at": "2024-12-04T01:01:28Z", - "stargazers_count": 30, - "watchers_count": 30, + "stargazers_count": 32, + "watchers_count": 32, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 30, + "watchers": 32, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-11680.json b/2024/CVE-2024-11680.json index da59a206d3..0657e16854 100644 --- a/2024/CVE-2024-11680.json +++ b/2024/CVE-2024-11680.json @@ -14,10 +14,10 @@ "description": "This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older versions. The exploit targets a Cross-Site Request Forgery (CSRF) flaw in combination with Privilege Misconfiguration issues.", "fork": false, "created_at": "2024-12-04T18:42:43Z", - "updated_at": "2024-12-07T21:52:28Z", + "updated_at": "2024-12-10T05:27:17Z", "pushed_at": "2024-12-04T19:25:34Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 9, + "watchers": 10, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-12209.json b/2024/CVE-2024-12209.json index d64b77133d..84fc2f68e1 100644 --- a/2024/CVE-2024-12209.json +++ b/2024/CVE-2024-12209.json @@ -28,6 +28,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-12270.json b/2024/CVE-2024-12270.json index e2d055c3bf..6280c48e94 100644 --- a/2024/CVE-2024-12270.json +++ b/2024/CVE-2024-12270.json @@ -28,6 +28,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-20356.json b/2024/CVE-2024-20356.json index 3b96964719..17f1279d29 100644 --- a/2024/CVE-2024-20356.json +++ b/2024/CVE-2024-20356.json @@ -14,10 +14,10 @@ "description": "This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.", "fork": false, "created_at": "2024-04-12T15:07:42Z", - "updated_at": "2024-12-02T21:31:13Z", + "updated_at": "2024-12-10T03:08:06Z", "pushed_at": "2024-04-18T14:31:34Z", - "stargazers_count": 54, - "watchers_count": 54, + "stargazers_count": 55, + "watchers_count": 55, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 11, - "watchers": 54, + "watchers": 55, "score": 0, "subscribers_count": 8 }, diff --git a/2024/CVE-2024-21338.json b/2024/CVE-2024-21338.json index 998d2f3071..59d2ebb975 100644 --- a/2024/CVE-2024-21338.json +++ b/2024/CVE-2024-21338.json @@ -169,10 +169,10 @@ "description": "Windows AppLocker Driver (appid.sys) LPE", "fork": false, "created_at": "2024-07-29T13:18:06Z", - "updated_at": "2024-12-09T02:39:50Z", + "updated_at": "2024-12-10T01:35:06Z", "pushed_at": "2024-07-29T13:29:59Z", - "stargazers_count": 42, - "watchers_count": 42, + "stargazers_count": 43, + "watchers_count": 43, "has_discussions": false, "forks_count": 13, "allow_forking": true, @@ -186,7 +186,7 @@ ], "visibility": "public", "forks": 13, - "watchers": 42, + "watchers": 43, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-21413.json b/2024/CVE-2024-21413.json index da5d7f7086..3e97257c5a 100644 --- a/2024/CVE-2024-21413.json +++ b/2024/CVE-2024-21413.json @@ -14,10 +14,10 @@ "description": "Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC", "fork": false, "created_at": "2024-02-15T19:57:38Z", - "updated_at": "2024-11-06T01:28:23Z", + "updated_at": "2024-12-10T06:03:40Z", "pushed_at": "2024-02-17T07:08:49Z", - "stargazers_count": 154, - "watchers_count": 154, + "stargazers_count": 155, + "watchers_count": 155, "has_discussions": false, "forks_count": 32, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 32, - "watchers": 154, + "watchers": 155, "score": 0, "subscribers_count": 4 }, diff --git a/2024/CVE-2024-22734.json b/2024/CVE-2024-22734.json index ee1ed589c2..c2fbc166a6 100644 --- a/2024/CVE-2024-22734.json +++ b/2024/CVE-2024-22734.json @@ -14,10 +14,10 @@ "description": "Exploit POC for CVE-2024-22734 affecting AMCS Trux Software", "fork": false, "created_at": "2024-12-01T17:47:16Z", - "updated_at": "2024-12-01T22:05:37Z", + "updated_at": "2024-12-10T05:31:10Z", "pushed_at": "2024-12-01T17:48:24Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-23334.json b/2024/CVE-2024-23334.json index bd1c1d0ecd..15226b442d 100644 --- a/2024/CVE-2024-23334.json +++ b/2024/CVE-2024-23334.json @@ -372,6 +372,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-23346.json b/2024/CVE-2024-23346.json index b35291b016..bb19f2b3fd 100644 --- a/2024/CVE-2024-23346.json +++ b/2024/CVE-2024-23346.json @@ -59,6 +59,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-24549.json b/2024/CVE-2024-24549.json index 9c988badab..d62d42c760 100644 --- a/2024/CVE-2024-24549.json +++ b/2024/CVE-2024-24549.json @@ -45,10 +45,10 @@ "description": "Proof of concept of the CVE-2024-24549, Exploit in Python. ", "fork": false, "created_at": "2024-12-09T04:59:07Z", - "updated_at": "2024-12-09T17:19:08Z", + "updated_at": "2024-12-10T06:04:55Z", "pushed_at": "2024-12-09T05:09:43Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -57,8 +57,8 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-38193.json b/2024/CVE-2024-38193.json index 1f6d6413b5..99a8418858 100644 --- a/2024/CVE-2024-38193.json +++ b/2024/CVE-2024-38193.json @@ -14,19 +14,19 @@ "description": null, "fork": false, "created_at": "2024-12-03T08:56:59Z", - "updated_at": "2024-12-10T00:28:13Z", + "updated_at": "2024-12-10T05:43:18Z", "pushed_at": "2024-11-18T23:48:31Z", - "stargazers_count": 25, - "watchers_count": 25, + "stargazers_count": 29, + "watchers_count": 29, "has_discussions": false, - "forks_count": 15, + "forks_count": 16, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 15, - "watchers": 25, + "forks": 16, + "watchers": 29, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-43160.json b/2024/CVE-2024-43160.json index a33c24ad9a..b719d86d60 100644 --- a/2024/CVE-2024-43160.json +++ b/2024/CVE-2024-43160.json @@ -14,10 +14,10 @@ "description": "The BerqWP – Automated All-In-One PageSpeed Optimization Plugin for Core Web Vitals, Cache, CDN, Images, CSS, and JavaScript plugin for WordPress is vulnerable to arbitrary file uploads", "fork": false, "created_at": "2024-09-17T04:19:54Z", - "updated_at": "2024-10-21T13:18:16Z", + "updated_at": "2024-12-10T02:51:46Z", "pushed_at": "2024-09-17T04:30:16Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-43918.json b/2024/CVE-2024-43918.json index eb5e7c41a2..5a395554af 100644 --- a/2024/CVE-2024-43918.json +++ b/2024/CVE-2024-43918.json @@ -14,10 +14,10 @@ "description": "WBW Product Table Pro <= 1.9.4 - Unauthenticated Arbitrary SQL Execution to RCE", "fork": false, "created_at": "2024-09-24T05:50:03Z", - "updated_at": "2024-10-08T13:47:15Z", + "updated_at": "2024-12-10T02:51:42Z", "pushed_at": "2024-09-24T05:52:04Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-4577.json b/2024/CVE-2024-4577.json index c6b6426469..6f9ddfcc5f 100644 --- a/2024/CVE-2024-4577.json +++ b/2024/CVE-2024-4577.json @@ -14,19 +14,19 @@ "description": "CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers to execute arbitrary commands via crafted URL parameters.", "fork": false, "created_at": "2024-06-07T05:50:23Z", - "updated_at": "2024-11-20T16:30:48Z", + "updated_at": "2024-12-10T01:57:46Z", "pushed_at": "2024-06-11T04:46:42Z", - "stargazers_count": 78, - "watchers_count": 78, + "stargazers_count": 79, + "watchers_count": 79, "has_discussions": false, - "forks_count": 17, + "forks_count": 18, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 17, - "watchers": 78, + "forks": 18, + "watchers": 79, "score": 0, "subscribers_count": 3 }, @@ -548,10 +548,10 @@ "description": "[漏洞复现] 全球首款利用PHP默认环境(XAMPP)的CVE-2024-4577 PHP-CGI RCE 漏洞 EXP。", "fork": false, "created_at": "2024-06-08T13:04:45Z", - "updated_at": "2024-12-06T08:24:22Z", + "updated_at": "2024-12-10T05:57:56Z", "pushed_at": "2024-07-21T20:27:03Z", - "stargazers_count": 123, - "watchers_count": 123, + "stargazers_count": 124, + "watchers_count": 124, "has_discussions": false, "forks_count": 31, "allow_forking": true, @@ -560,7 +560,7 @@ "topics": [], "visibility": "public", "forks": 31, - "watchers": 123, + "watchers": 124, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-48990.json b/2024/CVE-2024-48990.json index a6558ddb33..5c83c28046 100644 --- a/2024/CVE-2024-48990.json +++ b/2024/CVE-2024-48990.json @@ -282,6 +282,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-52940.json b/2024/CVE-2024-52940.json index 57fd70b781..d7fea728d3 100644 --- a/2024/CVE-2024-52940.json +++ b/2024/CVE-2024-52940.json @@ -14,10 +14,10 @@ "description": "CVE-2024-52940 - A zero-day vulnerability in AnyDesk's \"Allow Direct Connections\" feature, discovered and registered by Ebrahim Shafiei (EbraSha), exposing public and private IP addresses. For details, visit the NVD, Tenable, or MITRE pages.", "fork": false, "created_at": "2024-10-27T15:29:56Z", - "updated_at": "2024-12-02T11:19:03Z", + "updated_at": "2024-12-10T04:48:35Z", "pushed_at": "2024-11-18T15:09:32Z", - "stargazers_count": 28, - "watchers_count": 28, + "stargazers_count": 29, + "watchers_count": 29, "has_discussions": true, "forks_count": 10, "allow_forking": true, @@ -38,7 +38,7 @@ ], "visibility": "public", "forks": 10, - "watchers": 28, + "watchers": 29, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-6769.json b/2024/CVE-2024-6769.json index e89212fa91..2e559cf451 100644 --- a/2024/CVE-2024-6769.json +++ b/2024/CVE-2024-6769.json @@ -14,10 +14,10 @@ "description": "Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)", "fork": false, "created_at": "2024-08-29T16:40:49Z", - "updated_at": "2024-12-01T20:43:43Z", + "updated_at": "2024-12-10T01:25:37Z", "pushed_at": "2024-09-29T21:58:19Z", - "stargazers_count": 55, - "watchers_count": 55, + "stargazers_count": 56, + "watchers_count": 56, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 55, + "watchers": 56, "score": 0, "subscribers_count": 2 } diff --git a/2024/CVE-2024-9441.json b/2024/CVE-2024-9441.json index 1ecb717192..316c4b5975 100644 --- a/2024/CVE-2024-9441.json +++ b/2024/CVE-2024-9441.json @@ -126,6 +126,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/README.md b/README.md index caefc4e548..5c79c1cedf 100644 --- a/README.md +++ b/README.md @@ -26958,7 +26958,6 @@ - [PinkDraconian/CVE-2021-39433](https://github.com/PinkDraconian/CVE-2021-39433) -- [ibnurusdianto/CVE-2021-39433](https://github.com/ibnurusdianto/CVE-2021-39433) ### CVE-2021-39473 (2022-11-04) @@ -28728,6 +28727,7 @@ - [Vulnmachines/log4jshell_CVE-2021-44228](https://github.com/Vulnmachines/log4jshell_CVE-2021-44228) - [mr-vill4in/log4j-fuzzer](https://github.com/mr-vill4in/log4j-fuzzer) - [mebibite/log4jhound](https://github.com/mebibite/log4jhound) +- [jxerome/log4shell](https://github.com/jxerome/log4shell) - [sdogancesur/log4j_github_repository](https://github.com/sdogancesur/log4j_github_repository) - [jrocia/Search-log4Jvuln-AppScanSTD](https://github.com/jrocia/Search-log4Jvuln-AppScanSTD) - [aajuvonen/log4stdin](https://github.com/aajuvonen/log4stdin)