From d5ce87882c3ed03db10b9d7db1e4e393e13e0147 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Thu, 18 Apr 2024 15:27:57 +0900 Subject: [PATCH] Auto Update 2024/04/18 06:27:57 --- 2009/CVE-2009-1330.json | 8 +++---- 2014/CVE-2014-4210.json | 8 +++---- 2016/CVE-2016-0638.json | 8 +++---- 2017/CVE-2017-12615.json | 8 +++---- 2017/CVE-2017-3248.json | 8 +++---- 2018/CVE-2018-2628.json | 8 +++---- 2019/CVE-2019-2618.json | 8 +++---- 2020/CVE-2020-0022.json | 8 +++---- 2020/CVE-2020-1472.json | 16 +++++++------- 2020/CVE-2020-2551.json | 8 +++---- 2021/CVE-2021-2119.json | 4 ++-- 2021/CVE-2021-44228.json | 10 ++++----- 2022/CVE-2022-0185.json | 10 ++++----- 2022/CVE-2022-0847.json | 8 +++---- 2022/CVE-2022-20421.json | 8 +++---- 2022/CVE-2022-21907.json | 8 +++---- 2022/CVE-2022-29581.json | 2 +- 2023/CVE-2023-0669.json | 8 +++---- 2023/CVE-2023-25194.json | 2 +- 2023/CVE-2023-38831.json | 12 +++++----- 2023/CVE-2023-46604.json | 10 ++++----- 2024/CVE-2024-0305.json | 32 +++++++++++++++++++++++++++ 2024/CVE-2024-1086.json | 12 +++++----- 2024/CVE-2024-1874.json | 2 +- 2024/CVE-2024-21107.json | 2 +- 2024/CVE-2024-21338.json | 14 ++++++------ 2024/CVE-2024-21762.json | 38 ++++--------------------------- 2024/CVE-2024-21894.json | 30 ------------------------- 2024/CVE-2024-22243.json | 2 +- 2024/CVE-2024-22328.json | 32 --------------------------- 2024/CVE-2024-24576.json | 12 +++++----- 2024/CVE-2024-25600.json | 2 +- 2024/CVE-2024-27316.json | 30 +++++++++++++++++++++++++ 2024/CVE-2024-3094.json | 8 +++---- 2024/CVE-2024-31497.json | 4 ++-- 2024/CVE-2024-3217.json | 10 ++++----- 2024/CVE-2024-3400.json | 48 ++++++++++++++++++++-------------------- 2024/CVE-2024-3867.json | 32 --------------------------- README.md | 24 +++++++------------- 39 files changed, 217 insertions(+), 287 deletions(-) create mode 100644 2024/CVE-2024-0305.json delete mode 100644 2024/CVE-2024-22328.json delete mode 100644 2024/CVE-2024-3867.json diff --git a/2009/CVE-2009-1330.json b/2009/CVE-2009-1330.json index b69c3fbe3c..2ce994b90a 100644 --- a/2009/CVE-2009-1330.json +++ b/2009/CVE-2009-1330.json @@ -13,10 +13,10 @@ "description": "Simple exploit for Easy RM to MP3 Converter 2.7.3.700 on Windows 7 32b.", "fork": false, "created_at": "2018-12-30T12:17:08Z", - "updated_at": "2018-12-31T10:09:34Z", + "updated_at": "2024-04-18T05:04:48Z", "pushed_at": "2018-12-31T09:59:17Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 2 }, diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index e70ed4a0b9..80fb910c40 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -43,10 +43,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-04-17T10:12:13Z", + "updated_at": "2024-04-18T01:00:22Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1920, - "watchers_count": 1920, + "stargazers_count": 1921, + "watchers_count": 1921, "has_discussions": true, "forks_count": 332, "allow_forking": true, @@ -76,7 +76,7 @@ ], "visibility": "public", "forks": 332, - "watchers": 1920, + "watchers": 1921, "score": 0, "subscribers_count": 35 }, diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 718acca50c..182f467634 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-04-17T10:12:13Z", + "updated_at": "2024-04-18T01:00:22Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1920, - "watchers_count": 1920, + "stargazers_count": 1921, + "watchers_count": 1921, "has_discussions": true, "forks_count": 332, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 332, - "watchers": 1920, + "watchers": 1921, "score": 0, "subscribers_count": 35 }, diff --git a/2017/CVE-2017-12615.json b/2017/CVE-2017-12615.json index e8f61bccc4..c19ef793c0 100644 --- a/2017/CVE-2017-12615.json +++ b/2017/CVE-2017-12615.json @@ -373,10 +373,10 @@ "description": "Tomcat PUT方法任意文件写入(CVE-2017-12615)exp", "fork": false, "created_at": "2023-03-10T16:26:45Z", - "updated_at": "2024-03-19T10:34:28Z", + "updated_at": "2024-04-18T01:26:02Z", "pushed_at": "2023-03-14T07:39:41Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 11, + "watchers_count": 11, "has_discussions": true, "forks_count": 1, "allow_forking": true, @@ -385,7 +385,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 10, + "watchers": 11, "score": 0, "subscribers_count": 1 } diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 9805636589..880f4f186a 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -43,10 +43,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-04-17T10:12:13Z", + "updated_at": "2024-04-18T01:00:22Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1920, - "watchers_count": 1920, + "stargazers_count": 1921, + "watchers_count": 1921, "has_discussions": true, "forks_count": 332, "allow_forking": true, @@ -76,7 +76,7 @@ ], "visibility": "public", "forks": 332, - "watchers": 1920, + "watchers": 1921, "score": 0, "subscribers_count": 35 }, diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index bef3c18b0b..99a129252f 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -557,10 +557,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-04-17T10:12:13Z", + "updated_at": "2024-04-18T01:00:22Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1920, - "watchers_count": 1920, + "stargazers_count": 1921, + "watchers_count": 1921, "has_discussions": true, "forks_count": 332, "allow_forking": true, @@ -590,7 +590,7 @@ ], "visibility": "public", "forks": 332, - "watchers": 1920, + "watchers": 1921, "score": 0, "subscribers_count": 35 }, diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 433d799949..81e3fe4fe8 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -193,10 +193,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-04-17T10:12:13Z", + "updated_at": "2024-04-18T01:00:22Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1920, - "watchers_count": 1920, + "stargazers_count": 1921, + "watchers_count": 1921, "has_discussions": true, "forks_count": 332, "allow_forking": true, @@ -226,7 +226,7 @@ ], "visibility": "public", "forks": 332, - "watchers": 1920, + "watchers": 1921, "score": 0, "subscribers_count": 35 } diff --git a/2020/CVE-2020-0022.json b/2020/CVE-2020-0022.json index b6e0858d22..2d8c20fb55 100644 --- a/2020/CVE-2020-0022.json +++ b/2020/CVE-2020-0022.json @@ -73,10 +73,10 @@ "description": "This is a RCE bluetooth vulnerability on Android 8.0 and 9.0", "fork": false, "created_at": "2020-07-01T00:23:33Z", - "updated_at": "2024-02-23T06:01:02Z", + "updated_at": "2024-04-18T04:15:02Z", "pushed_at": "2023-05-23T04:46:45Z", - "stargazers_count": 17, - "watchers_count": 17, + "stargazers_count": 18, + "watchers_count": 18, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 17, + "watchers": 18, "score": 0, "subscribers_count": 2 }, diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index 1bfd6eb622..b635c64c78 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -43,10 +43,10 @@ "description": "Test tool for CVE-2020-1472", "fork": false, "created_at": "2020-09-08T08:58:37Z", - "updated_at": "2024-04-12T13:58:51Z", + "updated_at": "2024-04-18T00:30:04Z", "pushed_at": "2023-07-20T10:51:42Z", - "stargazers_count": 1690, - "watchers_count": 1690, + "stargazers_count": 1691, + "watchers_count": 1691, "has_discussions": false, "forks_count": 361, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 361, - "watchers": 1690, + "watchers": 1691, "score": 0, "subscribers_count": 87 }, @@ -103,10 +103,10 @@ "description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura", "fork": false, "created_at": "2020-09-14T16:56:51Z", - "updated_at": "2024-04-14T17:16:33Z", + "updated_at": "2024-04-18T00:30:54Z", "pushed_at": "2020-11-03T09:45:24Z", - "stargazers_count": 1139, - "watchers_count": 1139, + "stargazers_count": 1140, + "watchers_count": 1140, "has_discussions": false, "forks_count": 286, "allow_forking": true, @@ -115,7 +115,7 @@ "topics": [], "visibility": "public", "forks": 286, - "watchers": 1139, + "watchers": 1140, "score": 0, "subscribers_count": 35 }, diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 6d1bc06ea0..8a0b30c5ad 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-04-17T10:12:13Z", + "updated_at": "2024-04-18T01:00:22Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1920, - "watchers_count": 1920, + "stargazers_count": 1921, + "watchers_count": 1921, "has_discussions": true, "forks_count": 332, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 332, - "watchers": 1920, + "watchers": 1921, "score": 0, "subscribers_count": 35 }, diff --git a/2021/CVE-2021-2119.json b/2021/CVE-2021-2119.json index 59dba2813e..7a32a010a7 100644 --- a/2021/CVE-2021-2119.json +++ b/2021/CVE-2021-2119.json @@ -18,13 +18,13 @@ "stargazers_count": 140, "watchers_count": 140, "has_discussions": false, - "forks_count": 23, + "forks_count": 21, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 23, + "forks": 21, "watchers": 140, "score": 0, "subscribers_count": 10 diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 9f6474613a..4e787514eb 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -1527,7 +1527,7 @@ "fork": false, "created_at": "2021-12-11T12:16:45Z", "updated_at": "2023-05-28T11:06:10Z", - "pushed_at": "2024-04-14T21:55:08Z", + "pushed_at": "2024-04-18T05:10:29Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, @@ -4127,10 +4127,10 @@ "description": "Burp extension to scan Log4Shell (CVE-2021-44228) vulnerability pre and post auth.", "fork": false, "created_at": "2021-12-13T11:06:46Z", - "updated_at": "2024-04-11T11:36:52Z", + "updated_at": "2024-04-18T01:25:02Z", "pushed_at": "2021-12-26T09:58:06Z", - "stargazers_count": 98, - "watchers_count": 98, + "stargazers_count": 99, + "watchers_count": 99, "has_discussions": false, "forks_count": 27, "allow_forking": true, @@ -4139,7 +4139,7 @@ "topics": [], "visibility": "public", "forks": 27, - "watchers": 98, + "watchers": 99, "score": 0, "subscribers_count": 7 }, diff --git a/2022/CVE-2022-0185.json b/2022/CVE-2022-0185.json index 2a6f5e116f..e1a43a191f 100644 --- a/2022/CVE-2022-0185.json +++ b/2022/CVE-2022-0185.json @@ -193,10 +193,10 @@ "description": null, "fork": false, "created_at": "2024-04-15T02:42:43Z", - "updated_at": "2024-04-17T19:09:59Z", - "pushed_at": "2024-04-17T22:58:31Z", - "stargazers_count": 0, - "watchers_count": 0, + "updated_at": "2024-04-18T05:15:03Z", + "pushed_at": "2024-04-18T05:14:22Z", + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -205,7 +205,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index af127668bf..15e6e96088 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -133,10 +133,10 @@ "description": "A root exploit for CVE-2022-0847 (Dirty Pipe)", "fork": false, "created_at": "2022-03-07T18:55:20Z", - "updated_at": "2024-04-14T08:22:50Z", + "updated_at": "2024-04-18T03:46:37Z", "pushed_at": "2022-03-08T06:20:05Z", - "stargazers_count": 1072, - "watchers_count": 1072, + "stargazers_count": 1073, + "watchers_count": 1073, "has_discussions": false, "forks_count": 219, "allow_forking": true, @@ -145,7 +145,7 @@ "topics": [], "visibility": "public", "forks": 219, - "watchers": 1072, + "watchers": 1073, "score": 0, "subscribers_count": 17 }, diff --git a/2022/CVE-2022-20421.json b/2022/CVE-2022-20421.json index d9e21bc2f7..eb358b6ed9 100644 --- a/2022/CVE-2022-20421.json +++ b/2022/CVE-2022-20421.json @@ -13,10 +13,10 @@ "description": "Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)", "fork": false, "created_at": "2023-03-23T10:25:59Z", - "updated_at": "2024-04-16T16:55:30Z", + "updated_at": "2024-04-18T02:44:36Z", "pushed_at": "2023-05-27T15:39:41Z", - "stargazers_count": 213, - "watchers_count": 213, + "stargazers_count": 214, + "watchers_count": 214, "has_discussions": false, "forks_count": 30, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 30, - "watchers": 213, + "watchers": 214, "score": 0, "subscribers_count": 7 } diff --git a/2022/CVE-2022-21907.json b/2022/CVE-2022-21907.json index 19bcb341ee..1b1bd4ebe2 100644 --- a/2022/CVE-2022-21907.json +++ b/2022/CVE-2022-21907.json @@ -93,10 +93,10 @@ "description": "HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907", "fork": false, "created_at": "2022-01-17T02:28:50Z", - "updated_at": "2024-04-08T16:54:25Z", + "updated_at": "2024-04-18T05:08:02Z", "pushed_at": "2022-01-20T02:07:59Z", - "stargazers_count": 362, - "watchers_count": 362, + "stargazers_count": 361, + "watchers_count": 361, "has_discussions": false, "forks_count": 98, "allow_forking": true, @@ -105,7 +105,7 @@ "topics": [], "visibility": "public", "forks": 98, - "watchers": 362, + "watchers": 361, "score": 0, "subscribers_count": 10 }, diff --git a/2022/CVE-2022-29581.json b/2022/CVE-2022-29581.json index a54978a1fe..0332dfa233 100644 --- a/2022/CVE-2022-29581.json +++ b/2022/CVE-2022-29581.json @@ -44,7 +44,7 @@ "fork": false, "created_at": "2022-12-23T12:33:21Z", "updated_at": "2023-03-10T01:15:25Z", - "pushed_at": "2024-04-16T23:38:54Z", + "pushed_at": "2024-04-18T02:47:35Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2023/CVE-2023-0669.json b/2023/CVE-2023-0669.json index b25dcb2d1f..29c63719ed 100644 --- a/2023/CVE-2023-0669.json +++ b/2023/CVE-2023-0669.json @@ -13,10 +13,10 @@ "description": "CVE-2023-0669 GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object.", "fork": false, "created_at": "2023-02-10T13:02:55Z", - "updated_at": "2024-02-21T16:04:41Z", + "updated_at": "2024-04-18T02:18:05Z", "pushed_at": "2024-04-16T09:20:45Z", - "stargazers_count": 101, - "watchers_count": 101, + "stargazers_count": 102, + "watchers_count": 102, "has_discussions": false, "forks_count": 22, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 22, - "watchers": 101, + "watchers": 102, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-25194.json b/2023/CVE-2023-25194.json index 3f06f0dd73..96f787a3e4 100644 --- a/2023/CVE-2023-25194.json +++ b/2023/CVE-2023-25194.json @@ -90,6 +90,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-38831.json b/2023/CVE-2023-38831.json index d4d68fae2d..0a8d012711 100644 --- a/2023/CVE-2023-38831.json +++ b/2023/CVE-2023-38831.json @@ -48,7 +48,7 @@ "stargazers_count": 769, "watchers_count": 769, "has_discussions": false, - "forks_count": 139, + "forks_count": 140, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -58,7 +58,7 @@ "exploit" ], "visibility": "public", - "forks": 139, + "forks": 140, "watchers": 769, "score": 0, "subscribers_count": 9 @@ -107,10 +107,10 @@ "description": "一款用于生成winrar程序RCE(即cve-2023-38831)的POC的工具。", "fork": false, "created_at": "2023-08-27T14:08:36Z", - "updated_at": "2024-04-03T02:11:07Z", + "updated_at": "2024-04-18T02:54:46Z", "pushed_at": "2023-08-27T14:35:00Z", - "stargazers_count": 104, - "watchers_count": 104, + "stargazers_count": 105, + "watchers_count": 105, "has_discussions": false, "forks_count": 22, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 22, - "watchers": 104, + "watchers": 105, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-46604.json b/2023/CVE-2023-46604.json index 2a20f93cde..ebcf6b5686 100644 --- a/2023/CVE-2023-46604.json +++ b/2023/CVE-2023-46604.json @@ -43,10 +43,10 @@ "description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具", "fork": false, "created_at": "2023-10-27T05:57:21Z", - "updated_at": "2024-04-15T06:45:56Z", + "updated_at": "2024-04-18T02:51:30Z", "pushed_at": "2024-01-29T02:28:11Z", - "stargazers_count": 201, - "watchers_count": 201, + "stargazers_count": 202, + "watchers_count": 202, "has_discussions": false, "forks_count": 26, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 26, - "watchers": 201, + "watchers": 202, "score": 0, "subscribers_count": 4 }, @@ -722,6 +722,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-0305.json b/2024/CVE-2024-0305.json new file mode 100644 index 0000000000..8aa8feff98 --- /dev/null +++ b/2024/CVE-2024-0305.json @@ -0,0 +1,32 @@ +[ + { + "id": 788238757, + "name": "cve-2024-0305exp", + "full_name": "jidle123\/cve-2024-0305exp", + "owner": { + "login": "jidle123", + "id": 123531867, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123531867?v=4", + "html_url": "https:\/\/github.com\/jidle123" + }, + "html_url": "https:\/\/github.com\/jidle123\/cve-2024-0305exp", + "description": "cve-2024-0305可用的exp", + "fork": false, + "created_at": "2024-04-18T03:13:43Z", + "updated_at": "2024-04-18T03:25:54Z", + "pushed_at": "2024-04-18T03:30:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json index ffd77713eb..525f1364c4 100644 --- a/2024/CVE-2024-1086.json +++ b/2024/CVE-2024-1086.json @@ -13,12 +13,12 @@ "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.", "fork": false, "created_at": "2024-03-20T21:16:41Z", - "updated_at": "2024-04-17T15:12:06Z", + "updated_at": "2024-04-18T02:54:18Z", "pushed_at": "2024-04-17T16:09:54Z", - "stargazers_count": 1853, - "watchers_count": 1853, + "stargazers_count": 1854, + "watchers_count": 1854, "has_discussions": false, - "forks_count": 228, + "forks_count": 230, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -30,8 +30,8 @@ "poc" ], "visibility": "public", - "forks": 228, - "watchers": 1853, + "forks": 230, + "watchers": 1854, "score": 0, "subscribers_count": 19 }, diff --git a/2024/CVE-2024-1874.json b/2024/CVE-2024-1874.json index 65267ab5ec..ca246538fa 100644 --- a/2024/CVE-2024-1874.json +++ b/2024/CVE-2024-1874.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-21107.json b/2024/CVE-2024-21107.json index 43179115c7..e2b9bef3af 100644 --- a/2024/CVE-2024-21107.json +++ b/2024/CVE-2024-21107.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 1, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-21338.json b/2024/CVE-2024-21338.json index 2cafbe8ebc..1a0762cb94 100644 --- a/2024/CVE-2024-21338.json +++ b/2024/CVE-2024-21338.json @@ -13,19 +13,19 @@ "description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.", "fork": false, "created_at": "2024-04-13T05:53:02Z", - "updated_at": "2024-04-17T20:40:02Z", + "updated_at": "2024-04-18T05:14:22Z", "pushed_at": "2024-04-16T21:00:14Z", - "stargazers_count": 126, - "watchers_count": 126, + "stargazers_count": 138, + "watchers_count": 138, "has_discussions": false, - "forks_count": 28, + "forks_count": 29, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 28, - "watchers": 126, + "forks": 29, + "watchers": 138, "score": 0, "subscribers_count": 2 }, @@ -57,6 +57,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-21762.json b/2024/CVE-2024-21762.json index 96b4220029..c08cc5b342 100644 --- a/2024/CVE-2024-21762.json +++ b/2024/CVE-2024-21762.json @@ -13,10 +13,10 @@ "description": "Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762", "fork": false, "created_at": "2024-02-28T21:16:10Z", - "updated_at": "2024-04-17T16:45:52Z", + "updated_at": "2024-04-18T03:49:26Z", "pushed_at": "2024-03-01T20:02:52Z", - "stargazers_count": 82, - "watchers_count": 82, + "stargazers_count": 83, + "watchers_count": 83, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 11, - "watchers": 82, + "watchers": 83, "score": 0, "subscribers_count": 6 }, @@ -208,35 +208,5 @@ "watchers": 5, "score": 0, "subscribers_count": 1 - }, - { - "id": 787627670, - "name": "Cve-2024-21762-", - "full_name": "Codeb3af\/Cve-2024-21762-", - "owner": { - "login": "Codeb3af", - "id": 167255943, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/167255943?v=4", - "html_url": "https:\/\/github.com\/Codeb3af" - }, - "html_url": "https:\/\/github.com\/Codeb3af\/Cve-2024-21762-", - "description": "Full exploit of Cve-2024-21762!", - "fork": false, - "created_at": "2024-04-16T22:06:52Z", - "updated_at": "2024-04-16T22:10:40Z", - "pushed_at": "2024-04-16T22:15:57Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-21894.json b/2024/CVE-2024-21894.json index a3354835f1..4457178a8b 100644 --- a/2024/CVE-2024-21894.json +++ b/2024/CVE-2024-21894.json @@ -1,34 +1,4 @@ [ - { - "id": 783829842, - "name": "CVE-2024-21894-POC", - "full_name": "RansomGroupCVE\/CVE-2024-21894-POC", - "owner": { - "login": "RansomGroupCVE", - "id": 166298400, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/166298400?v=4", - "html_url": "https:\/\/github.com\/RansomGroupCVE" - }, - "html_url": "https:\/\/github.com\/RansomGroupCVE\/CVE-2024-21894-POC", - "description": " Exploit CVE-2024-21894 for Vulnerable Ivanti Connect Secure and Policy Secure Gateways POC", - "fork": false, - "created_at": "2024-04-08T16:50:32Z", - "updated_at": "2024-04-10T17:39:32Z", - "pushed_at": "2024-04-11T15:53:45Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - }, { "id": 785615377, "name": "CVE-2024-21894-Proof-of-concept", diff --git a/2024/CVE-2024-22243.json b/2024/CVE-2024-22243.json index 2502a8d48c..69edc045a8 100644 --- a/2024/CVE-2024-22243.json +++ b/2024/CVE-2024-22243.json @@ -13,7 +13,7 @@ "description": " env of CVE-2024-22243&CVE-2024-22234", "fork": false, "created_at": "2024-02-23T10:09:51Z", - "updated_at": "2024-03-21T07:11:41Z", + "updated_at": "2024-04-18T01:29:27Z", "pushed_at": "2024-02-28T06:55:26Z", "stargazers_count": 2, "watchers_count": 2, diff --git a/2024/CVE-2024-22328.json b/2024/CVE-2024-22328.json deleted file mode 100644 index f32d94c634..0000000000 --- a/2024/CVE-2024-22328.json +++ /dev/null @@ -1,32 +0,0 @@ -[ - { - "id": 783282598, - "name": "CVE-2024-22328-POC", - "full_name": "RansomGroupCVE\/CVE-2024-22328-POC", - "owner": { - "login": "RansomGroupCVE", - "id": 166298400, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/166298400?v=4", - "html_url": "https:\/\/github.com\/RansomGroupCVE" - }, - "html_url": "https:\/\/github.com\/RansomGroupCVE\/CVE-2024-22328-POC", - "description": "About POC CVE-2024-22328 Exploit ", - "fork": false, - "created_at": "2024-04-07T13:09:17Z", - "updated_at": "2024-04-07T13:09:18Z", - "pushed_at": "2024-04-13T16:09:43Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-24576.json b/2024/CVE-2024-24576.json index de96258928..9e595f8db7 100644 --- a/2024/CVE-2024-24576.json +++ b/2024/CVE-2024-24576.json @@ -73,10 +73,10 @@ "description": "CVE-2024-24576 Proof of Concept", "fork": false, "created_at": "2024-04-10T14:06:09Z", - "updated_at": "2024-04-17T21:05:24Z", + "updated_at": "2024-04-18T05:04:34Z", "pushed_at": "2024-04-10T14:42:34Z", - "stargazers_count": 14, - "watchers_count": 14, + "stargazers_count": 15, + "watchers_count": 15, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -90,7 +90,7 @@ ], "visibility": "public", "forks": 4, - "watchers": 14, + "watchers": 15, "score": 0, "subscribers_count": 2 }, @@ -138,8 +138,8 @@ "description": "This is a simple demo for the BadBatBut vulnerability CVE-2024-24576", "fork": false, "created_at": "2024-04-12T23:36:05Z", - "updated_at": "2024-04-17T21:05:33Z", - "pushed_at": "2024-04-13T00:19:45Z", + "updated_at": "2024-04-18T04:31:18Z", + "pushed_at": "2024-04-18T04:24:32Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, diff --git a/2024/CVE-2024-25600.json b/2024/CVE-2024-25600.json index 6253416541..f771ce7111 100644 --- a/2024/CVE-2024-25600.json +++ b/2024/CVE-2024-25600.json @@ -195,6 +195,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-27316.json b/2024/CVE-2024-27316.json index 2132825f09..dda2b17ede 100644 --- a/2024/CVE-2024-27316.json +++ b/2024/CVE-2024-27316.json @@ -35,5 +35,35 @@ "watchers": 7, "score": 0, "subscribers_count": 2 + }, + { + "id": 788117590, + "name": "CVE-2024-27316_poc", + "full_name": "aeyesec\/CVE-2024-27316_poc", + "owner": { + "login": "aeyesec", + "id": 61375985, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61375985?v=4", + "html_url": "https:\/\/github.com\/aeyesec" + }, + "html_url": "https:\/\/github.com\/aeyesec\/CVE-2024-27316_poc", + "description": null, + "fork": false, + "created_at": "2024-04-17T20:08:05Z", + "updated_at": "2024-04-18T01:27:19Z", + "pushed_at": "2024-04-17T21:31:35Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-3094.json b/2024/CVE-2024-3094.json index bcb7667a7c..e4850bb58d 100644 --- a/2024/CVE-2024-3094.json +++ b/2024/CVE-2024-3094.json @@ -1012,10 +1012,10 @@ "description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)", "fork": false, "created_at": "2024-04-01T14:28:09Z", - "updated_at": "2024-04-17T15:30:23Z", + "updated_at": "2024-04-18T01:34:10Z", "pushed_at": "2024-04-03T04:58:50Z", - "stargazers_count": 3379, - "watchers_count": 3379, + "stargazers_count": 3380, + "watchers_count": 3380, "has_discussions": false, "forks_count": 227, "allow_forking": true, @@ -1024,7 +1024,7 @@ "topics": [], "visibility": "public", "forks": 227, - "watchers": 3379, + "watchers": 3380, "score": 0, "subscribers_count": 34 }, diff --git a/2024/CVE-2024-31497.json b/2024/CVE-2024-31497.json index e059c6059e..e811cef6e9 100644 --- a/2024/CVE-2024-31497.json +++ b/2024/CVE-2024-31497.json @@ -27,7 +27,7 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 }, { "id": 787871319, @@ -57,6 +57,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-3217.json b/2024/CVE-2024-3217.json index c337cc813d..2ed4125705 100644 --- a/2024/CVE-2024-3217.json +++ b/2024/CVE-2024-3217.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2024-04-17T13:43:57Z", - "updated_at": "2024-04-17T15:38:44Z", + "updated_at": "2024-04-18T06:20:00Z", "pushed_at": "2024-04-17T14:15:05Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,8 +25,8 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 1, + "watchers": 2, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-3400.json b/2024/CVE-2024-3400.json index 34f0d8e4df..123bac5675 100644 --- a/2024/CVE-2024-3400.json +++ b/2024/CVE-2024-3400.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2024-04-13T05:16:21Z", - "updated_at": "2024-04-17T14:35:35Z", + "updated_at": "2024-04-18T03:40:33Z", "pushed_at": "2024-04-13T05:20:15Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 6, + "watchers": 7, "score": 0, "subscribers_count": 1 }, @@ -73,10 +73,10 @@ "description": "CVE-2024-3400", "fork": false, "created_at": "2024-04-13T14:00:31Z", - "updated_at": "2024-04-17T19:08:06Z", - "pushed_at": "2024-04-17T19:05:41Z", - "stargazers_count": 26, - "watchers_count": 26, + "updated_at": "2024-04-18T03:38:21Z", + "pushed_at": "2024-04-18T05:49:19Z", + "stargazers_count": 30, + "watchers_count": 30, "has_discussions": false, "forks_count": 17, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 17, - "watchers": 26, + "watchers": 30, "score": 0, "subscribers_count": 2 }, @@ -283,10 +283,10 @@ "description": "CVE-2024-3400 Palo Alto OS Command Injection", "fork": false, "created_at": "2024-04-16T14:18:08Z", - "updated_at": "2024-04-17T21:46:51Z", + "updated_at": "2024-04-18T06:17:23Z", "pushed_at": "2024-04-16T22:35:43Z", - "stargazers_count": 58, - "watchers_count": 58, + "stargazers_count": 68, + "watchers_count": 68, "has_discussions": false, "forks_count": 12, "allow_forking": true, @@ -295,7 +295,7 @@ "topics": [], "visibility": "public", "forks": 12, - "watchers": 58, + "watchers": 68, "score": 0, "subscribers_count": 1 }, @@ -313,10 +313,10 @@ "description": "CVE-2024-3400-RCE", "fork": false, "created_at": "2024-04-16T16:18:56Z", - "updated_at": "2024-04-17T13:05:58Z", + "updated_at": "2024-04-18T02:03:38Z", "pushed_at": "2024-04-17T01:11:01Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 11, + "watchers_count": 11, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -325,7 +325,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 10, + "watchers": 11, "score": 0, "subscribers_count": 2 }, @@ -387,7 +387,7 @@ "forks": 2, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 }, { "id": 787614808, @@ -447,7 +447,7 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 }, { "id": 787813638, @@ -477,7 +477,7 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 }, { "id": 787894337, @@ -507,7 +507,7 @@ "forks": 0, "watchers": 1, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 }, { "id": 788013743, @@ -537,7 +537,7 @@ "forks": 1, "watchers": 5, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 }, { "id": 788136951, @@ -567,7 +567,7 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 }, { "id": 788161583, @@ -597,6 +597,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-3867.json b/2024/CVE-2024-3867.json deleted file mode 100644 index 7d24d431a7..0000000000 --- a/2024/CVE-2024-3867.json +++ /dev/null @@ -1,32 +0,0 @@ -[ - { - "id": 787533779, - "name": "CVE-2024-3867-POC", - "full_name": "RansomGroupCVE\/CVE-2024-3867-POC", - "owner": { - "login": "RansomGroupCVE", - "id": 166298400, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/166298400?v=4", - "html_url": "https:\/\/github.com\/RansomGroupCVE" - }, - "html_url": "https:\/\/github.com\/RansomGroupCVE\/CVE-2024-3867-POC", - "description": "Exploiting Reflected Cross-Site Scripting (XSS) in WordPress archive-tainacan-collection Theme", - "fork": false, - "created_at": "2024-04-16T17:52:19Z", - "updated_at": "2024-04-16T17:52:19Z", - "pushed_at": "2024-04-16T17:55:01Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/README.md b/README.md index eb0c554e3c..e0140229d6 100644 --- a/README.md +++ b/README.md @@ -25,6 +25,13 @@ - [m-cetin/CVE-2024-0204](https://github.com/m-cetin/CVE-2024-0204) - [adminlove520/CVE-2024-0204](https://github.com/adminlove520/CVE-2024-0204) +### CVE-2024-0305 (2024-01-08) + +Eine Schwachstelle wurde in Guangzhou Yingke Electronic Technology Ncast bis 2017 gefunden. Sie wurde als problematisch eingestuft. Dies betrifft einen unbekannten Teil der Datei /manage/IPSetup.php der Komponente Guest Login. Durch das Manipulieren mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung. + + +- [jidle123/cve-2024-0305exp](https://github.com/jidle123/cve-2024-0305exp) + ### CVE-2024-0582 (2024-01-16) A memory leak flaw was found in the Linux kernel’s io_uring functionality in how a user registers a buffer ring with IORING_REGISTER_PBUF_RING, mmap() it, and then frees it. This flaw allows a local user to crash or potentially escalate their privileges on the system. @@ -393,13 +400,6 @@ - [phantomradar/cve-2024-3400-poc](https://github.com/phantomradar/cve-2024-3400-poc) - [retkoussa/CVE-2024-3400](https://github.com/retkoussa/CVE-2024-3400) -### CVE-2024-3867 (2024-04-16) - -The archive-tainacan-collection theme for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in version 2.7.2. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. - - -- [RansomGroupCVE/CVE-2024-3867-POC](https://github.com/RansomGroupCVE/CVE-2024-3867-POC) - ### CVE-2024-12883 - [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883) @@ -581,7 +581,6 @@ - [d0rb/CVE-2024-21762](https://github.com/d0rb/CVE-2024-21762) - [lolminerxmrig/multicheck_CVE-2024-21762](https://github.com/lolminerxmrig/multicheck_CVE-2024-21762) - [AlexLondan/CVE-2024-21762-Fortinet-RCE-ALLWORK](https://github.com/AlexLondan/CVE-2024-21762-Fortinet-RCE-ALLWORK) -- [Codeb3af/Cve-2024-21762-](https://github.com/Codeb3af/Cve-2024-21762-) ### CVE-2024-21887 (2024-01-12) @@ -610,7 +609,6 @@ A heap overflow vulnerability in IPSec component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure allows an unauthenticated malicious user to send specially crafted requests in-order-to crash the service thereby causing a DoS attack. In certain conditions this may lead to execution of arbitrary code -- [RansomGroupCVE/CVE-2024-21894-POC](https://github.com/RansomGroupCVE/CVE-2024-21894-POC) - [AlexLondan/CVE-2024-21894-Proof-of-concept](https://github.com/AlexLondan/CVE-2024-21894-Proof-of-concept) ### CVE-2024-22024 (2024-02-13) @@ -630,13 +628,6 @@ - [shellfeel/CVE-2024-22243-CVE-2024-22234](https://github.com/shellfeel/CVE-2024-22243-CVE-2024-22234) -### CVE-2024-22328 (2024-04-06) - -IBM Maximo Application Suite 8.10 and 8.11 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 279950. - - -- [RansomGroupCVE/CVE-2024-22328-POC](https://github.com/RansomGroupCVE/CVE-2024-22328-POC) - ### CVE-2024-22369 (2024-02-20) Deserialization of Untrusted Data vulnerability in Apache Camel SQL ComponentThis issue affects Apache Camel: from 3.0.0 before 3.21.4, from 3.22.0 before 3.22.1, from 4.0.0 before 4.0.4, from 4.1.0 before 4.4.0.\n\nUsers are recommended to upgrade to version 4.4.0, which fixes the issue. If users are on the 4.0.x LTS releases stream, then they are suggested to upgrade to 4.0.4. If users are on 3.x, they are suggested to move to 3.21.4 or 3.22.1\n\n @@ -1270,6 +1261,7 @@ - [lockness-Ko/CVE-2024-27316](https://github.com/lockness-Ko/CVE-2024-27316) +- [aeyesec/CVE-2024-27316_poc](https://github.com/aeyesec/CVE-2024-27316_poc) ### CVE-2024-27462 - [Alaatk/CVE-2024-27462](https://github.com/Alaatk/CVE-2024-27462)