From d19f91d5f869397626c78cd667913ac7f9aba9cb Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Thu, 26 Dec 2024 21:32:05 +0900 Subject: [PATCH] Auto Update 2024/12/26 12:32:05 --- 2002/CVE-2002-20001.json | 8 ++++---- 2016/CVE-2016-5195.json | 16 ++++++++-------- 2017/CVE-2017-11882.json | 31 +++++++++++++++++++++++++++++++ 2019/CVE-2019-17558.json | 8 ++++---- 2020/CVE-2020-14882.json | 8 ++++---- 2021/CVE-2021-21972.json | 8 ++++---- 2021/CVE-2021-22005.json | 8 ++++---- 2021/CVE-2021-22911.json | 31 +++++++++++++++++++++++++++++++ 2021/CVE-2021-37624.json | 8 ++++---- 2021/CVE-2021-41773.json | 31 ------------------------------- 2021/CVE-2021-44228.json | 8 ++++---- 2022/CVE-2022-22954.json | 8 ++++---- 2022/CVE-2022-22965.json | 8 ++++---- 2022/CVE-2022-25636.json | 8 ++++---- 2022/CVE-2022-29582.json | 4 ++-- 2022/CVE-2022-46463.json | 2 +- 2023/CVE-2023-21554.json | 8 ++++---- 2023/CVE-2023-23397.json | 12 ++++++------ 2023/CVE-2023-36874.json | 8 ++++---- 2023/CVE-2023-4357.json | 8 ++++---- 2023/CVE-2023-44487.json | 12 ++++++------ 2023/CVE-2023-45819.json | 8 ++++---- 2023/CVE-2023-45866.json | 2 +- 2024/CVE-2024-30088.json | 8 ++++---- 2024/CVE-2024-3094.json | 8 ++++---- 2024/CVE-2024-38063.json | 2 +- 2024/CVE-2024-49039.json | 12 ++++++------ 2024/CVE-2024-50379.json | 16 ++++++++-------- 2024/CVE-2024-53677.json | 8 ++++---- README.md | 3 ++- 30 files changed, 171 insertions(+), 139 deletions(-) diff --git a/2002/CVE-2002-20001.json b/2002/CVE-2002-20001.json index 83e80fa64d..9a079d185f 100644 --- a/2002/CVE-2002-20001.json +++ b/2002/CVE-2002-20001.json @@ -14,10 +14,10 @@ "description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)", "fork": false, "created_at": "2021-08-31T09:51:12Z", - "updated_at": "2024-12-06T09:40:30Z", + "updated_at": "2024-12-26T06:26:35Z", "pushed_at": "2024-05-03T22:24:07Z", - "stargazers_count": 187, - "watchers_count": 187, + "stargazers_count": 186, + "watchers_count": 186, "has_discussions": false, "forks_count": 26, "allow_forking": true, @@ -47,7 +47,7 @@ ], "visibility": "public", "forks": 26, - "watchers": 187, + "watchers": 186, "score": 0, "subscribers_count": 8 } diff --git a/2016/CVE-2016-5195.json b/2016/CVE-2016-5195.json index 7bc0e498c7..e64ae45c52 100644 --- a/2016/CVE-2016-5195.json +++ b/2016/CVE-2016-5195.json @@ -272,10 +272,10 @@ "description": "A CVE-2016-5195 exploit example.", "fork": false, "created_at": "2016-10-23T00:16:33Z", - "updated_at": "2024-12-18T13:41:48Z", + "updated_at": "2024-12-26T06:35:52Z", "pushed_at": "2017-03-21T16:46:38Z", - "stargazers_count": 317, - "watchers_count": 317, + "stargazers_count": 318, + "watchers_count": 318, "has_discussions": false, "forks_count": 120, "allow_forking": true, @@ -288,7 +288,7 @@ ], "visibility": "public", "forks": 120, - "watchers": 317, + "watchers": 318, "score": 0, "subscribers_count": 16 }, @@ -462,10 +462,10 @@ "description": "Dirty Cow exploit - CVE-2016-5195", "fork": false, "created_at": "2016-11-25T21:08:01Z", - "updated_at": "2024-12-12T05:15:53Z", + "updated_at": "2024-12-26T06:36:05Z", "pushed_at": "2021-04-08T11:35:12Z", - "stargazers_count": 866, - "watchers_count": 866, + "stargazers_count": 867, + "watchers_count": 867, "has_discussions": false, "forks_count": 426, "allow_forking": true, @@ -478,7 +478,7 @@ ], "visibility": "public", "forks": 426, - "watchers": 866, + "watchers": 867, "score": 0, "subscribers_count": 9 }, diff --git a/2017/CVE-2017-11882.json b/2017/CVE-2017-11882.json index 57858785bf..960600d2a5 100644 --- a/2017/CVE-2017-11882.json +++ b/2017/CVE-2017-11882.json @@ -1041,5 +1041,36 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 908465504, + "name": "Malware-Analysis-CVE-2017-11882", + "full_name": "yaseenibnakhtar\/Malware-Analysis-CVE-2017-11882", + "owner": { + "login": "yaseenibnakhtar", + "id": 167536932, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/167536932?v=4", + "html_url": "https:\/\/github.com\/yaseenibnakhtar", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/yaseenibnakhtar\/Malware-Analysis-CVE-2017-11882", + "description": "Malware Analysis CVE-2017-11882", + "fork": false, + "created_at": "2024-12-26T06:23:27Z", + "updated_at": "2024-12-26T06:24:35Z", + "pushed_at": "2024-12-26T06:24:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 9e7dea5442..b463b54c4e 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -45,10 +45,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2024-12-26T03:18:18Z", + "updated_at": "2024-12-26T10:35:31Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 4146, - "watchers_count": 4146, + "stargazers_count": 4147, + "watchers_count": 4147, "has_discussions": false, "forks_count": 1099, "allow_forking": true, @@ -77,7 +77,7 @@ ], "visibility": "public", "forks": 1099, - "watchers": 4146, + "watchers": 4147, "score": 0, "subscribers_count": 149 }, diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 14598b0f2d..be96ae1ac0 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -14,10 +14,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2024-12-26T03:18:18Z", + "updated_at": "2024-12-26T10:35:31Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 4146, - "watchers_count": 4146, + "stargazers_count": 4147, + "watchers_count": 4147, "has_discussions": false, "forks_count": 1099, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 1099, - "watchers": 4146, + "watchers": 4147, "score": 0, "subscribers_count": 149 }, diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index 2d14b9527c..27ed02b874 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -848,10 +848,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2024-12-26T06:14:49Z", + "updated_at": "2024-12-26T08:17:55Z", "pushed_at": "2024-04-25T06:09:38Z", - "stargazers_count": 1351, - "watchers_count": 1351, + "stargazers_count": 1353, + "watchers_count": 1353, "has_discussions": false, "forks_count": 166, "allow_forking": true, @@ -867,7 +867,7 @@ ], "visibility": "public", "forks": 166, - "watchers": 1351, + "watchers": 1353, "score": 0, "subscribers_count": 15 } diff --git a/2021/CVE-2021-22005.json b/2021/CVE-2021-22005.json index df486d3eb4..b4137154b1 100644 --- a/2021/CVE-2021-22005.json +++ b/2021/CVE-2021-22005.json @@ -293,10 +293,10 @@ "description": null, "fork": false, "created_at": "2021-12-18T08:18:50Z", - "updated_at": "2024-12-03T11:47:16Z", + "updated_at": "2024-12-26T06:35:37Z", "pushed_at": "2021-12-22T10:32:37Z", - "stargazers_count": 190, - "watchers_count": 190, + "stargazers_count": 191, + "watchers_count": 191, "has_discussions": false, "forks_count": 48, "allow_forking": true, @@ -305,7 +305,7 @@ "topics": [], "visibility": "public", "forks": 48, - "watchers": 190, + "watchers": 191, "score": 0, "subscribers_count": 5 }, diff --git a/2021/CVE-2021-22911.json b/2021/CVE-2021-22911.json index 414dcd55ae..84c2699c19 100644 --- a/2021/CVE-2021-22911.json +++ b/2021/CVE-2021-22911.json @@ -215,5 +215,36 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 908543261, + "name": "Rocket-Chat-3.12.1-PoC-CVE-2021-22911-", + "full_name": "yoohhuu\/Rocket-Chat-3.12.1-PoC-CVE-2021-22911-", + "owner": { + "login": "yoohhuu", + "id": 155578268, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/155578268?v=4", + "html_url": "https:\/\/github.com\/yoohhuu", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/yoohhuu\/Rocket-Chat-3.12.1-PoC-CVE-2021-22911-", + "description": null, + "fork": false, + "created_at": "2024-12-26T10:27:51Z", + "updated_at": "2024-12-26T10:56:24Z", + "pushed_at": "2024-12-26T10:56:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-37624.json b/2021/CVE-2021-37624.json index c90f43c051..fb6e623124 100644 --- a/2021/CVE-2021-37624.json +++ b/2021/CVE-2021-37624.json @@ -14,10 +14,10 @@ "description": "A FreeSWITCH specific scanning and exploitation toolkit for CVE-2021-37624 and CVE-2021-41157.", "fork": false, "created_at": "2021-11-28T13:12:38Z", - "updated_at": "2024-10-03T05:15:56Z", + "updated_at": "2024-12-26T06:26:36Z", "pushed_at": "2021-12-05T16:54:16Z", - "stargazers_count": 29, - "watchers_count": 29, + "stargazers_count": 28, + "watchers_count": 28, "has_discussions": false, "forks_count": 10, "allow_forking": true, @@ -33,7 +33,7 @@ ], "visibility": "public", "forks": 10, - "watchers": 29, + "watchers": 28, "score": 0, "subscribers_count": 2 } diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json index 48bfec2357..62c11e69e2 100644 --- a/2021/CVE-2021-41773.json +++ b/2021/CVE-2021-41773.json @@ -2232,37 +2232,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 447314257, - "name": "CVE-2021-41773-exploiter", - "full_name": "norrig\/CVE-2021-41773-exploiter", - "owner": { - "login": "norrig", - "id": 5526261, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5526261?v=4", - "html_url": "https:\/\/github.com\/norrig", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/norrig\/CVE-2021-41773-exploiter", - "description": "School project - Please use other repos for actual testing", - "fork": false, - "created_at": "2022-01-12T17:42:36Z", - "updated_at": "2022-01-12T18:26:57Z", - "pushed_at": "2022-01-13T16:18:33Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 452242021, "name": "CVE-2021-41773-exercise", diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 40b43274fa..be3f40be89 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -1307,10 +1307,10 @@ "description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks", "fork": false, "created_at": "2021-12-11T07:19:11Z", - "updated_at": "2024-12-24T22:24:43Z", + "updated_at": "2024-12-26T10:20:43Z", "pushed_at": "2023-06-13T09:17:54Z", - "stargazers_count": 806, - "watchers_count": 806, + "stargazers_count": 807, + "watchers_count": 807, "has_discussions": false, "forks_count": 111, "allow_forking": true, @@ -1324,7 +1324,7 @@ ], "visibility": "public", "forks": 111, - "watchers": 806, + "watchers": 807, "score": 0, "subscribers_count": 11 }, diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json index 31c6eb1b03..07a3850d66 100644 --- a/2022/CVE-2022-22954.json +++ b/2022/CVE-2022-22954.json @@ -792,10 +792,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2024-12-26T06:14:49Z", + "updated_at": "2024-12-26T08:17:55Z", "pushed_at": "2024-04-25T06:09:38Z", - "stargazers_count": 1351, - "watchers_count": 1351, + "stargazers_count": 1353, + "watchers_count": 1353, "has_discussions": false, "forks_count": 166, "allow_forking": true, @@ -811,7 +811,7 @@ ], "visibility": "public", "forks": 166, - "watchers": 1351, + "watchers": 1353, "score": 0, "subscribers_count": 15 } diff --git a/2022/CVE-2022-22965.json b/2022/CVE-2022-22965.json index feeb3eb4b4..6266878456 100644 --- a/2022/CVE-2022-22965.json +++ b/2022/CVE-2022-22965.json @@ -2099,10 +2099,10 @@ "description": "CVE-2022-22965\\Spring-Core-RCE核弹级别漏洞的rce图形化GUI一键利用工具,基于JavaFx开发,图形化操作更简单,提高效率。", "fork": false, "created_at": "2022-12-28T04:50:16Z", - "updated_at": "2024-12-22T06:16:30Z", + "updated_at": "2024-12-26T10:42:15Z", "pushed_at": "2023-11-14T03:08:10Z", - "stargazers_count": 100, - "watchers_count": 100, + "stargazers_count": 101, + "watchers_count": 101, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -2111,7 +2111,7 @@ "topics": [], "visibility": "public", "forks": 15, - "watchers": 100, + "watchers": 101, "score": 0, "subscribers_count": 3 }, diff --git a/2022/CVE-2022-25636.json b/2022/CVE-2022-25636.json index cbbc265c08..e963963c2a 100644 --- a/2022/CVE-2022-25636.json +++ b/2022/CVE-2022-25636.json @@ -14,10 +14,10 @@ "description": "CVE-2022-25636", "fork": false, "created_at": "2022-03-07T13:38:41Z", - "updated_at": "2024-12-16T14:15:56Z", + "updated_at": "2024-12-26T08:40:19Z", "pushed_at": "2022-03-07T17:18:19Z", - "stargazers_count": 427, - "watchers_count": 427, + "stargazers_count": 428, + "watchers_count": 428, "has_discussions": false, "forks_count": 83, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 83, - "watchers": 427, + "watchers": 428, "score": 0, "subscribers_count": 6 }, diff --git a/2022/CVE-2022-29582.json b/2022/CVE-2022-29582.json index d809efcc86..cc26633434 100644 --- a/2022/CVE-2022-29582.json +++ b/2022/CVE-2022-29582.json @@ -19,13 +19,13 @@ "stargazers_count": 72, "watchers_count": 72, "has_discussions": false, - "forks_count": 11, + "forks_count": 10, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 11, + "forks": 10, "watchers": 72, "score": 0, "subscribers_count": 4 diff --git a/2022/CVE-2022-46463.json b/2022/CVE-2022-46463.json index dd94512c8b..6748c5c7ae 100644 --- a/2022/CVE-2022-46463.json +++ b/2022/CVE-2022-46463.json @@ -14,7 +14,7 @@ "description": "CVE-2022-46463(Harbor 未授权)", "fork": false, "created_at": "2023-01-17T14:58:14Z", - "updated_at": "2024-10-23T10:06:01Z", + "updated_at": "2024-12-26T07:35:14Z", "pushed_at": "2023-01-19T12:47:21Z", "stargazers_count": 24, "watchers_count": 24, diff --git a/2023/CVE-2023-21554.json b/2023/CVE-2023-21554.json index 73e971a5c8..b44e8fdf8a 100644 --- a/2023/CVE-2023-21554.json +++ b/2023/CVE-2023-21554.json @@ -14,10 +14,10 @@ "description": "CVE-2023-21554 Windows MessageQueuing PoC,分析见 https:\/\/www.zoemurmure.top\/posts\/cve_2023_21554\/", "fork": false, "created_at": "2023-05-18T10:30:49Z", - "updated_at": "2024-12-26T02:20:05Z", + "updated_at": "2024-12-26T10:57:27Z", "pushed_at": "2023-05-18T10:38:57Z", - "stargazers_count": 56, - "watchers_count": 56, + "stargazers_count": 57, + "watchers_count": 57, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 15, - "watchers": 56, + "watchers": 57, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-23397.json b/2023/CVE-2023-23397.json index f097fa1d1e..84bc1c3275 100644 --- a/2023/CVE-2023-23397.json +++ b/2023/CVE-2023-23397.json @@ -179,19 +179,19 @@ "description": null, "fork": false, "created_at": "2023-03-16T19:43:39Z", - "updated_at": "2024-10-28T18:14:31Z", + "updated_at": "2024-12-26T11:47:54Z", "pushed_at": "2023-03-17T07:47:40Z", - "stargazers_count": 340, - "watchers_count": 340, + "stargazers_count": 341, + "watchers_count": 341, "has_discussions": false, - "forks_count": 63, + "forks_count": 64, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 63, - "watchers": 340, + "forks": 64, + "watchers": 341, "score": 0, "subscribers_count": 5 }, diff --git a/2023/CVE-2023-36874.json b/2023/CVE-2023-36874.json index ddd04e3bf9..84b88f1e06 100644 --- a/2023/CVE-2023-36874.json +++ b/2023/CVE-2023-36874.json @@ -76,10 +76,10 @@ "description": null, "fork": false, "created_at": "2023-08-23T12:07:40Z", - "updated_at": "2024-11-15T16:48:23Z", + "updated_at": "2024-12-26T11:49:29Z", "pushed_at": "2023-08-23T16:46:53Z", - "stargazers_count": 235, - "watchers_count": 235, + "stargazers_count": 236, + "watchers_count": 236, "has_discussions": false, "forks_count": 47, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 47, - "watchers": 235, + "watchers": 236, "score": 0, "subscribers_count": 5 }, diff --git a/2023/CVE-2023-4357.json b/2023/CVE-2023-4357.json index 0d90262780..d000c4d127 100644 --- a/2023/CVE-2023-4357.json +++ b/2023/CVE-2023-4357.json @@ -14,10 +14,10 @@ "description": "[漏洞复现] 全球首款单文件利用 CVE-2023-4357 Chrome XXE 漏洞 EXP, 实现对访客者本地文件窃取. Chrome XXE vulnerability EXP, allowing attackers to obtain local files of visitors.", "fork": false, "created_at": "2023-11-17T10:32:31Z", - "updated_at": "2024-12-19T09:49:49Z", + "updated_at": "2024-12-26T07:07:35Z", "pushed_at": "2023-11-21T10:45:58Z", - "stargazers_count": 204, - "watchers_count": 204, + "stargazers_count": 205, + "watchers_count": 205, "has_discussions": false, "forks_count": 34, "allow_forking": true, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 34, - "watchers": 204, + "watchers": 205, "score": 0, "subscribers_count": 3 }, diff --git a/2023/CVE-2023-44487.json b/2023/CVE-2023-44487.json index 61ef385970..21e8ba6ba3 100644 --- a/2023/CVE-2023-44487.json +++ b/2023/CVE-2023-44487.json @@ -19,13 +19,13 @@ "stargazers_count": 225, "watchers_count": 225, "has_discussions": false, - "forks_count": 50, + "forks_count": 49, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 50, + "forks": 49, "watchers": 225, "score": 0, "subscribers_count": 6 @@ -146,10 +146,10 @@ "description": "Tool for testing mitigations and exposure to Rapid Reset DDoS (CVE-2023-44487)", "fork": false, "created_at": "2023-10-13T23:55:32Z", - "updated_at": "2024-12-01T00:52:26Z", + "updated_at": "2024-12-26T11:20:04Z", "pushed_at": "2023-10-30T20:22:37Z", - "stargazers_count": 62, - "watchers_count": 62, + "stargazers_count": 63, + "watchers_count": 63, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -158,7 +158,7 @@ "topics": [], "visibility": "public", "forks": 16, - "watchers": 62, + "watchers": 63, "score": 0, "subscribers_count": 4 }, diff --git a/2023/CVE-2023-45819.json b/2023/CVE-2023-45819.json index 2d50bcc735..19dd0d819b 100644 --- a/2023/CVE-2023-45819.json +++ b/2023/CVE-2023-45819.json @@ -14,10 +14,10 @@ "description": "Proof of concept for CVE-2023-45819", "fork": false, "created_at": "2024-12-17T15:19:33Z", - "updated_at": "2024-12-17T18:46:35Z", + "updated_at": "2024-12-26T10:08:48Z", "pushed_at": "2024-12-17T15:26:05Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index 75234b0430..f5f39e4518 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -14,7 +14,7 @@ "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "fork": false, "created_at": "2024-01-16T06:52:02Z", - "updated_at": "2024-12-26T03:33:10Z", + "updated_at": "2024-12-26T11:15:44Z", "pushed_at": "2024-08-18T08:26:46Z", "stargazers_count": 1312, "watchers_count": 1312, diff --git a/2024/CVE-2024-30088.json b/2024/CVE-2024-30088.json index f235c4fe79..a4b9e511ab 100644 --- a/2024/CVE-2024-30088.json +++ b/2024/CVE-2024-30088.json @@ -107,10 +107,10 @@ "description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088", "fork": false, "created_at": "2024-07-15T08:07:05Z", - "updated_at": "2024-12-24T15:17:30Z", + "updated_at": "2024-12-26T09:48:29Z", "pushed_at": "2024-09-08T21:23:34Z", - "stargazers_count": 430, - "watchers_count": 430, + "stargazers_count": 431, + "watchers_count": 431, "has_discussions": false, "forks_count": 31, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 31, - "watchers": 430, + "watchers": 431, "score": 0, "subscribers_count": 21 }, diff --git a/2024/CVE-2024-3094.json b/2024/CVE-2024-3094.json index 784fc05127..919c973b8d 100644 --- a/2024/CVE-2024-3094.json +++ b/2024/CVE-2024-3094.json @@ -952,10 +952,10 @@ "description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)", "fork": false, "created_at": "2024-04-01T14:28:09Z", - "updated_at": "2024-12-26T06:26:44Z", + "updated_at": "2024-12-26T09:55:22Z", "pushed_at": "2024-04-03T04:58:50Z", - "stargazers_count": 3499, - "watchers_count": 3499, + "stargazers_count": 3500, + "watchers_count": 3500, "has_discussions": false, "forks_count": 240, "allow_forking": true, @@ -964,7 +964,7 @@ "topics": [], "visibility": "public", "forks": 240, - "watchers": 3499, + "watchers": 3500, "score": 0, "subscribers_count": 38 }, diff --git a/2024/CVE-2024-38063.json b/2024/CVE-2024-38063.json index 9a6f48c022..85c7374c44 100644 --- a/2024/CVE-2024-38063.json +++ b/2024/CVE-2024-38063.json @@ -451,7 +451,7 @@ "description": "This is a C language program designed to test the Windows TCP\/IP Remote Code Execution Vulnerability (CVE-2024-38063). It sends specially crafted IPv6 packets with embedded shellcode to exploit the vulnerability.", "fork": false, "created_at": "2024-09-01T09:20:02Z", - "updated_at": "2024-12-14T11:26:03Z", + "updated_at": "2024-12-26T09:45:42Z", "pushed_at": "2024-09-08T07:12:26Z", "stargazers_count": 5, "watchers_count": 5, diff --git a/2024/CVE-2024-49039.json b/2024/CVE-2024-49039.json index cf4bec3172..54660e38f9 100644 --- a/2024/CVE-2024-49039.json +++ b/2024/CVE-2024-49039.json @@ -14,19 +14,19 @@ "description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler", "fork": false, "created_at": "2024-11-19T08:57:18Z", - "updated_at": "2024-12-22T22:50:00Z", + "updated_at": "2024-12-26T12:29:10Z", "pushed_at": "2024-11-19T09:15:26Z", - "stargazers_count": 99, - "watchers_count": 99, + "stargazers_count": 100, + "watchers_count": 100, "has_discussions": false, - "forks_count": 21, + "forks_count": 22, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 21, - "watchers": 99, + "forks": 22, + "watchers": 100, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-50379.json b/2024/CVE-2024-50379.json index b8cc0791a5..54a6df55e8 100644 --- a/2024/CVE-2024-50379.json +++ b/2024/CVE-2024-50379.json @@ -200,10 +200,10 @@ "description": "tomcat CVE-2024-50379\/CVE-2024-56337 条件竞争文件上传exp", "fork": false, "created_at": "2024-12-23T07:20:47Z", - "updated_at": "2024-12-26T03:14:09Z", + "updated_at": "2024-12-26T07:32:26Z", "pushed_at": "2024-12-23T07:30:27Z", - "stargazers_count": 38, - "watchers_count": 38, + "stargazers_count": 41, + "watchers_count": 41, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -212,7 +212,7 @@ "topics": [], "visibility": "public", "forks": 11, - "watchers": 38, + "watchers": 41, "score": 0, "subscribers_count": 3 }, @@ -262,8 +262,8 @@ "description": "CVE-2024-50379-exp", "fork": false, "created_at": "2024-12-25T02:41:31Z", - "updated_at": "2024-12-26T06:28:50Z", - "pushed_at": "2024-12-26T06:28:46Z", + "updated_at": "2024-12-26T08:52:18Z", + "pushed_at": "2024-12-26T08:52:15Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, @@ -324,8 +324,8 @@ "description": "Testing the latset Apache Tomcat CVE-2024-50379 Vuln", "fork": false, "created_at": "2024-12-25T21:50:16Z", - "updated_at": "2024-12-25T21:51:40Z", - "pushed_at": "2024-12-25T21:51:37Z", + "updated_at": "2024-12-26T10:31:55Z", + "pushed_at": "2024-12-26T10:31:51Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2024/CVE-2024-53677.json b/2024/CVE-2024-53677.json index 9e316f55e3..92bad1d635 100644 --- a/2024/CVE-2024-53677.json +++ b/2024/CVE-2024-53677.json @@ -45,10 +45,10 @@ "description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.", "fork": false, "created_at": "2024-12-13T17:42:55Z", - "updated_at": "2024-12-26T01:46:25Z", + "updated_at": "2024-12-26T06:46:12Z", "pushed_at": "2024-12-20T10:05:15Z", - "stargazers_count": 72, - "watchers_count": 72, + "stargazers_count": 73, + "watchers_count": 73, "has_discussions": false, "forks_count": 29, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 29, - "watchers": 72, + "watchers": 73, "score": 0, "subscribers_count": 3 }, diff --git a/README.md b/README.md index 80c988da1f..a695b7e7eb 100644 --- a/README.md +++ b/README.md @@ -24983,6 +24983,7 @@ - [MrDottt/CVE-2021-22911](https://github.com/MrDottt/CVE-2021-22911) - [overgrowncarrot1/CVE-2021-22911](https://github.com/overgrowncarrot1/CVE-2021-22911) - [Weisant/CVE-2021-22911-EXP](https://github.com/Weisant/CVE-2021-22911-EXP) +- [yoohhuu/Rocket-Chat-3.12.1-PoC-CVE-2021-22911-](https://github.com/yoohhuu/Rocket-Chat-3.12.1-PoC-CVE-2021-22911-) ### CVE-2021-22924 (2021-08-05) @@ -28019,7 +28020,6 @@ - [kubota/POC-CVE-2021-41773](https://github.com/kubota/POC-CVE-2021-41773) - [xMohamed0/CVE-2021-41773](https://github.com/xMohamed0/CVE-2021-41773) - [i6c/MASS_CVE-2021-41773](https://github.com/i6c/MASS_CVE-2021-41773) -- [norrig/CVE-2021-41773-exploiter](https://github.com/norrig/CVE-2021-41773-exploiter) - [m96dg/CVE-2021-41773-exercise](https://github.com/m96dg/CVE-2021-41773-exercise) - [skentagon/CVE-2021-41773](https://github.com/skentagon/CVE-2021-41773) - [mauricelambert/CVE-2021-41773](https://github.com/mauricelambert/CVE-2021-41773) @@ -44248,6 +44248,7 @@ - [n18dcat053-luuvannga/DetectPacket-CVE-2017-11882](https://github.com/n18dcat053-luuvannga/DetectPacket-CVE-2017-11882) - [nhuynhuy/cve-2017-11882](https://github.com/nhuynhuy/cve-2017-11882) - [jadeapar/Dragonfish-s-Malware-Cyber-Analysis](https://github.com/jadeapar/Dragonfish-s-Malware-Cyber-Analysis) +- [yaseenibnakhtar/Malware-Analysis-CVE-2017-11882](https://github.com/yaseenibnakhtar/Malware-Analysis-CVE-2017-11882) ### CVE-2017-11907 (2017-12-12)