From d0be535bd4bec5ddcfe3d27ba8433105a70854c2 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Sun, 1 Dec 2024 21:33:11 +0900 Subject: [PATCH] Auto Update 2024/12/01 12:33:11 --- 2014/CVE-2014-0160.json | 8 ++++---- 2017/CVE-2017-7921.json | 16 ++++++++-------- 2018/CVE-2018-0101.json | 8 ++++---- 2019/CVE-2019-19781.json | 8 ++++---- 2020/CVE-2020-7961.json | 8 ++++---- 2021/CVE-2021-36260.json | 8 ++++---- 2021/CVE-2021-44228.json | 8 ++++---- 2022/CVE-2022-30190.json | 8 ++++---- 2022/CVE-2022-3552.json | 8 ++++---- 2022/CVE-2022-39952.json | 4 ++-- 2023/CVE-2023-21094.json | 8 ++++---- 2023/CVE-2023-21839.json | 4 ++-- 2023/CVE-2023-23397.json | 12 ++++++------ 2023/CVE-2023-32315.json | 8 ++++---- 2023/CVE-2023-33246.json | 8 ++++---- 2023/CVE-2023-38831.json | 8 ++++---- 2024/CVE-2024-0012.json | 4 ++-- 2024/CVE-2024-11477.json | 8 ++++---- 2024/CVE-2024-25600.json | 8 ++++---- 2024/CVE-2024-3273.json | 8 ++++---- 2024/CVE-2024-4577.json | 8 ++++---- README.md | 2 +- 22 files changed, 85 insertions(+), 85 deletions(-) diff --git a/2014/CVE-2014-0160.json b/2014/CVE-2014-0160.json index 3f640cfc9e..e84d21e623 100644 --- a/2014/CVE-2014-0160.json +++ b/2014/CVE-2014-0160.json @@ -14,10 +14,10 @@ "description": "A checker (site and tool) for CVE-2014-0160", "fork": false, "created_at": "2014-04-07T23:03:09Z", - "updated_at": "2024-11-20T14:42:25Z", + "updated_at": "2024-12-01T10:53:20Z", "pushed_at": "2021-02-24T09:17:24Z", - "stargazers_count": 2306, - "watchers_count": 2306, + "stargazers_count": 2305, + "watchers_count": 2305, "has_discussions": false, "forks_count": 461, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 461, - "watchers": 2306, + "watchers": 2305, "score": 0, "subscribers_count": 117 }, diff --git a/2017/CVE-2017-7921.json b/2017/CVE-2017-7921.json index a60be0e3ac..1f5f873bea 100644 --- a/2017/CVE-2017-7921.json +++ b/2017/CVE-2017-7921.json @@ -14,10 +14,10 @@ "description": "Hikvision camera CVE-2017-7921-EXP", "fork": false, "created_at": "2020-04-27T11:49:40Z", - "updated_at": "2024-10-25T14:40:51Z", + "updated_at": "2024-12-01T09:58:27Z", "pushed_at": "2023-12-04T15:47:16Z", - "stargazers_count": 87, - "watchers_count": 87, + "stargazers_count": 88, + "watchers_count": 88, "has_discussions": false, "forks_count": 18, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 18, - "watchers": 87, + "watchers": 88, "score": 0, "subscribers_count": 4 }, @@ -107,10 +107,10 @@ "description": "This python file will decrypt the configurationFile used by hikvision cameras vulnerable to CVE-2017-7921.", "fork": false, "created_at": "2021-01-29T16:08:35Z", - "updated_at": "2024-11-06T01:07:04Z", + "updated_at": "2024-12-01T09:54:11Z", "pushed_at": "2021-01-29T16:22:39Z", - "stargazers_count": 97, - "watchers_count": 97, + "stargazers_count": 98, + "watchers_count": 98, "has_discussions": false, "forks_count": 26, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 26, - "watchers": 97, + "watchers": 98, "score": 0, "subscribers_count": 3 }, diff --git a/2018/CVE-2018-0101.json b/2018/CVE-2018-0101.json index ceef9af61e..7b842993da 100644 --- a/2018/CVE-2018-0101.json +++ b/2018/CVE-2018-0101.json @@ -45,10 +45,10 @@ "description": "A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.", "fork": false, "created_at": "2018-02-08T15:52:50Z", - "updated_at": "2024-11-26T06:19:44Z", + "updated_at": "2024-12-01T11:41:55Z", "pushed_at": "2018-11-23T11:47:10Z", - "stargazers_count": 50, - "watchers_count": 50, + "stargazers_count": 51, + "watchers_count": 51, "has_discussions": false, "forks_count": 23, "allow_forking": true, @@ -66,7 +66,7 @@ ], "visibility": "public", "forks": 23, - "watchers": 50, + "watchers": 51, "score": 0, "subscribers_count": 9 } diff --git a/2019/CVE-2019-19781.json b/2019/CVE-2019-19781.json index e491a4fd13..ad76e5bf21 100644 --- a/2019/CVE-2019-19781.json +++ b/2019/CVE-2019-19781.json @@ -469,10 +469,10 @@ "description": "Detect and log CVE-2019-19781 scan and exploitation attempts.", "fork": false, "created_at": "2020-01-13T10:09:31Z", - "updated_at": "2024-08-25T14:56:02Z", + "updated_at": "2024-12-01T11:41:59Z", "pushed_at": "2020-01-15T13:58:22Z", - "stargazers_count": 113, - "watchers_count": 113, + "stargazers_count": 114, + "watchers_count": 114, "has_discussions": false, "forks_count": 29, "allow_forking": true, @@ -481,7 +481,7 @@ "topics": [], "visibility": "public", "forks": 29, - "watchers": 113, + "watchers": 114, "score": 0, "subscribers_count": 7 }, diff --git a/2020/CVE-2020-7961.json b/2020/CVE-2020-7961.json index 8aa219a4f6..7587e072bd 100644 --- a/2020/CVE-2020-7961.json +++ b/2020/CVE-2020-7961.json @@ -107,10 +107,10 @@ "description": null, "fork": false, "created_at": "2020-06-23T03:01:57Z", - "updated_at": "2022-01-29T03:40:25Z", + "updated_at": "2024-12-01T06:24:32Z", "pushed_at": "2020-06-23T03:05:26Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 3, + "watchers": 2, "score": 0, "subscribers_count": 2 }, diff --git a/2021/CVE-2021-36260.json b/2021/CVE-2021-36260.json index 59280e89d5..73589c0465 100644 --- a/2021/CVE-2021-36260.json +++ b/2021/CVE-2021-36260.json @@ -45,10 +45,10 @@ "description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.", "fork": false, "created_at": "2021-10-27T15:51:12Z", - "updated_at": "2024-11-29T11:43:34Z", + "updated_at": "2024-12-01T09:49:19Z", "pushed_at": "2021-10-28T06:37:37Z", - "stargazers_count": 256, - "watchers_count": 256, + "stargazers_count": 257, + "watchers_count": 257, "has_discussions": false, "forks_count": 76, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 76, - "watchers": 256, + "watchers": 257, "score": 0, "subscribers_count": 5 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index fdb6225f23..3c823da649 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -7299,10 +7299,10 @@ "description": "A honeypot for the Log4Shell vulnerability (CVE-2021-44228).", "fork": false, "created_at": "2021-12-15T22:30:34Z", - "updated_at": "2024-11-29T22:57:02Z", + "updated_at": "2024-12-01T11:52:36Z", "pushed_at": "2024-11-29T22:56:57Z", - "stargazers_count": 90, - "watchers_count": 90, + "stargazers_count": 91, + "watchers_count": 91, "has_discussions": true, "forks_count": 28, "allow_forking": true, @@ -7311,7 +7311,7 @@ "topics": [], "visibility": "public", "forks": 28, - "watchers": 90, + "watchers": 91, "score": 0, "subscribers_count": 7 }, diff --git a/2022/CVE-2022-30190.json b/2022/CVE-2022-30190.json index b27b64b473..fb61350914 100644 --- a/2022/CVE-2022-30190.json +++ b/2022/CVE-2022-30190.json @@ -14,10 +14,10 @@ "description": "POC CVE-2022-30190 : CVE 0-day MS Offic RCE aka msdt follina", "fork": false, "created_at": "2022-05-30T18:17:38Z", - "updated_at": "2024-11-24T13:54:06Z", + "updated_at": "2024-12-01T07:51:20Z", "pushed_at": "2022-06-05T21:06:13Z", - "stargazers_count": 154, - "watchers_count": 154, + "stargazers_count": 155, + "watchers_count": 155, "has_discussions": false, "forks_count": 57, "allow_forking": true, @@ -34,7 +34,7 @@ ], "visibility": "public", "forks": 57, - "watchers": 154, + "watchers": 155, "score": 0, "subscribers_count": 4 }, diff --git a/2022/CVE-2022-3552.json b/2022/CVE-2022-3552.json index d6b8b275d5..ff97619b95 100644 --- a/2022/CVE-2022-3552.json +++ b/2022/CVE-2022-3552.json @@ -2,15 +2,15 @@ { "id": 622192084, "name": "CVE-2022-3552", - "full_name": "kabir0x23\/CVE-2022-3552", + "full_name": "0xk4b1r\/CVE-2022-3552", "owner": { - "login": "kabir0x23", + "login": "0xk4b1r", "id": 44284877, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44284877?v=4", - "html_url": "https:\/\/github.com\/kabir0x23", + "html_url": "https:\/\/github.com\/0xk4b1r", "user_view_type": "public" }, - "html_url": "https:\/\/github.com\/kabir0x23\/CVE-2022-3552", + "html_url": "https:\/\/github.com\/0xk4b1r\/CVE-2022-3552", "description": "BoxBilling<=4.22.1.5 - Remote Code Execution (RCE)", "fork": false, "created_at": "2023-04-01T11:53:14Z", diff --git a/2022/CVE-2022-39952.json b/2022/CVE-2022-39952.json index e4a66f88c2..789e72048a 100644 --- a/2022/CVE-2022-39952.json +++ b/2022/CVE-2022-39952.json @@ -112,13 +112,13 @@ "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 2, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 2, + "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 0 diff --git a/2023/CVE-2023-21094.json b/2023/CVE-2023-21094.json index 585b2fe0cb..5248ffe8db 100644 --- a/2023/CVE-2023-21094.json +++ b/2023/CVE-2023-21094.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2023-10-25T07:54:39Z", - "updated_at": "2024-11-26T10:43:39Z", + "updated_at": "2024-12-01T07:02:11Z", "pushed_at": "2023-10-25T08:11:02Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 0, + "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 0, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-21839.json b/2023/CVE-2023-21839.json index 0155950109..7ec477160c 100644 --- a/2023/CVE-2023-21839.json +++ b/2023/CVE-2023-21839.json @@ -19,13 +19,13 @@ "stargazers_count": 228, "watchers_count": 228, "has_discussions": false, - "forks_count": 46, + "forks_count": 44, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 46, + "forks": 44, "watchers": 228, "score": 0, "subscribers_count": 3 diff --git a/2023/CVE-2023-23397.json b/2023/CVE-2023-23397.json index 85cfc3ad11..672cdb4406 100644 --- a/2023/CVE-2023-23397.json +++ b/2023/CVE-2023-23397.json @@ -184,13 +184,13 @@ "stargazers_count": 340, "watchers_count": 340, "has_discussions": false, - "forks_count": 62, + "forks_count": 63, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 62, + "forks": 63, "watchers": 340, "score": 0, "subscribers_count": 5 @@ -739,10 +739,10 @@ "description": null, "fork": false, "created_at": "2023-07-14T22:02:55Z", - "updated_at": "2023-08-06T00:14:02Z", + "updated_at": "2024-12-01T08:06:36Z", "pushed_at": "2023-07-15T11:21:52Z", - "stargazers_count": 20, - "watchers_count": 20, + "stargazers_count": 21, + "watchers_count": 21, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -751,7 +751,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 20, + "watchers": 21, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-32315.json b/2023/CVE-2023-32315.json index 070ef93e3c..51e335a7a8 100644 --- a/2023/CVE-2023-32315.json +++ b/2023/CVE-2023-32315.json @@ -266,10 +266,10 @@ "description": "A PoC exploit for CVE-2023-32315 - Openfire Authentication Bypass", "fork": false, "created_at": "2023-12-15T16:30:51Z", - "updated_at": "2024-08-03T02:01:59Z", + "updated_at": "2024-12-01T08:49:57Z", "pushed_at": "2024-05-17T23:51:11Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -282,7 +282,7 @@ ], "visibility": "public", "forks": 2, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-33246.json b/2023/CVE-2023-33246.json index 6f761c26be..9cc12fb32c 100644 --- a/2023/CVE-2023-33246.json +++ b/2023/CVE-2023-33246.json @@ -424,10 +424,10 @@ "description": null, "fork": false, "created_at": "2024-06-29T06:31:17Z", - "updated_at": "2024-06-29T07:26:05Z", + "updated_at": "2024-12-01T09:17:24Z", "pushed_at": "2024-06-29T07:26:02Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -436,7 +436,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-38831.json b/2023/CVE-2023-38831.json index bd5fe18a08..9d287f1690 100644 --- a/2023/CVE-2023-38831.json +++ b/2023/CVE-2023-38831.json @@ -45,10 +45,10 @@ "description": "CVE-2023-38831 winrar exploit generator", "fork": false, "created_at": "2023-08-25T09:44:08Z", - "updated_at": "2024-11-15T16:49:55Z", + "updated_at": "2024-12-01T08:23:26Z", "pushed_at": "2023-11-26T06:46:44Z", - "stargazers_count": 779, - "watchers_count": 779, + "stargazers_count": 780, + "watchers_count": 780, "has_discussions": false, "forks_count": 139, "allow_forking": true, @@ -61,7 +61,7 @@ ], "visibility": "public", "forks": 139, - "watchers": 779, + "watchers": 780, "score": 0, "subscribers_count": 9 }, diff --git a/2024/CVE-2024-0012.json b/2024/CVE-2024-0012.json index e83e43e0f0..9f5e9ee25c 100644 --- a/2024/CVE-2024-0012.json +++ b/2024/CVE-2024-0012.json @@ -231,8 +231,8 @@ "description": "CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC", "fork": false, "created_at": "2024-11-30T16:06:02Z", - "updated_at": "2024-11-30T17:57:25Z", - "pushed_at": "2024-11-30T17:57:21Z", + "updated_at": "2024-12-01T11:24:41Z", + "pushed_at": "2024-12-01T11:24:38Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2024/CVE-2024-11477.json b/2024/CVE-2024-11477.json index 86f6030903..59bd3a9f5c 100644 --- a/2024/CVE-2024-11477.json +++ b/2024/CVE-2024-11477.json @@ -14,10 +14,10 @@ "description": "CVE-2024-11477 7Zip Code Execution Writeup and Analysis", "fork": false, "created_at": "2024-11-29T06:13:36Z", - "updated_at": "2024-12-01T03:15:26Z", + "updated_at": "2024-12-01T08:35:41Z", "pushed_at": "2024-11-29T21:02:56Z", - "stargazers_count": 15, - "watchers_count": 15, + "stargazers_count": 17, + "watchers_count": 17, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 15, + "watchers": 17, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-25600.json b/2024/CVE-2024-25600.json index 1be8a3565b..6a4f099355 100644 --- a/2024/CVE-2024-25600.json +++ b/2024/CVE-2024-25600.json @@ -138,10 +138,10 @@ "description": "A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)", "fork": false, "created_at": "2024-03-01T09:28:08Z", - "updated_at": "2024-11-11T13:03:49Z", + "updated_at": "2024-12-01T08:46:11Z", "pushed_at": "2024-03-01T09:46:56Z", - "stargazers_count": 27, - "watchers_count": 27, + "stargazers_count": 28, + "watchers_count": 28, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -168,7 +168,7 @@ ], "visibility": "public", "forks": 7, - "watchers": 27, + "watchers": 28, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-3273.json b/2024/CVE-2024-3273.json index 72a9ab9da1..cd38db921e 100644 --- a/2024/CVE-2024-3273.json +++ b/2024/CVE-2024-3273.json @@ -107,10 +107,10 @@ "description": "A PoC exploit for CVE-2024-3273 - D-Link Remote Code Execution RCE", "fork": false, "created_at": "2024-04-09T12:26:37Z", - "updated_at": "2024-10-17T13:18:40Z", + "updated_at": "2024-12-01T08:51:48Z", "pushed_at": "2024-04-09T12:51:41Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -135,7 +135,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-4577.json b/2024/CVE-2024-4577.json index 65e158e692..3a7e9dc0a0 100644 --- a/2024/CVE-2024-4577.json +++ b/2024/CVE-2024-4577.json @@ -641,10 +641,10 @@ "description": "A PoC exploit for CVE-2024-4577 - PHP CGI Argument Injection Remote Code Execution (RCE)", "fork": false, "created_at": "2024-06-09T23:32:11Z", - "updated_at": "2024-11-20T16:30:49Z", + "updated_at": "2024-12-01T08:47:11Z", "pushed_at": "2024-07-12T02:56:25Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -667,7 +667,7 @@ ], "visibility": "public", "forks": 2, - "watchers": 6, + "watchers": 7, "score": 0, "subscribers_count": 1 }, diff --git a/README.md b/README.md index 16e5eff010..f100e59f45 100644 --- a/README.md +++ b/README.md @@ -16460,7 +16460,7 @@ Unrestricted Upload of File with Dangerous Type in GitHub repository boxbilling/boxbilling prior to 0.0.1. -- [kabir0x23/CVE-2022-3552](https://github.com/kabir0x23/CVE-2022-3552) +- [0xk4b1r/CVE-2022-3552](https://github.com/0xk4b1r/CVE-2022-3552) ### CVE-2022-3564 (2022-10-17)