diff --git a/2012/CVE-2012-1823.json b/2012/CVE-2012-1823.json index 05fcb6b11f..5b29cef69f 100644 --- a/2012/CVE-2012-1823.json +++ b/2012/CVE-2012-1823.json @@ -107,10 +107,10 @@ "description": null, "fork": false, "created_at": "2020-08-17T19:54:11Z", - "updated_at": "2024-06-10T09:47:16Z", + "updated_at": "2025-01-05T23:20:28Z", "pushed_at": "2020-08-17T20:16:11Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 0, + "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 1, + "watchers": 0, "score": 0, "subscribers_count": 1 }, diff --git a/2015/CVE-2015-3306.json b/2015/CVE-2015-3306.json index 297f621629..eb02557db1 100644 --- a/2015/CVE-2015-3306.json +++ b/2015/CVE-2015-3306.json @@ -81,7 +81,7 @@ "stargazers_count": 133, "watchers_count": 133, "has_discussions": false, - "forks_count": 53, + "forks_count": 52, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -94,7 +94,7 @@ "vulnerable-container" ], "visibility": "public", - "forks": 53, + "forks": 52, "watchers": 133, "score": 0, "subscribers_count": 3 diff --git a/2016/CVE-2016-0974.json b/2016/CVE-2016-0974.json index 9c37c686a6..88d6f86368 100644 --- a/2016/CVE-2016-0974.json +++ b/2016/CVE-2016-0974.json @@ -14,10 +14,10 @@ "description": "An implementation of CVE-2016-0974 for the Nintendo Wii.", "fork": false, "created_at": "2018-04-01T00:39:28Z", - "updated_at": "2024-02-08T14:30:31Z", + "updated_at": "2025-01-05T22:29:17Z", "pushed_at": "2024-02-21T17:35:59Z", - "stargazers_count": 32, - "watchers_count": 32, + "stargazers_count": 33, + "watchers_count": 33, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 32, + "watchers": 33, "score": 0, "subscribers_count": 3 } diff --git a/2016/CVE-2016-5195.json b/2016/CVE-2016-5195.json index 137c07f5cf..efcc0b7f89 100644 --- a/2016/CVE-2016-5195.json +++ b/2016/CVE-2016-5195.json @@ -462,10 +462,10 @@ "description": "Dirty Cow exploit - CVE-2016-5195", "fork": false, "created_at": "2016-11-25T21:08:01Z", - "updated_at": "2024-12-26T06:36:05Z", + "updated_at": "2025-01-05T22:50:49Z", "pushed_at": "2021-04-08T11:35:12Z", - "stargazers_count": 867, - "watchers_count": 867, + "stargazers_count": 868, + "watchers_count": 868, "has_discussions": false, "forks_count": 426, "allow_forking": true, @@ -478,7 +478,7 @@ ], "visibility": "public", "forks": 426, - "watchers": 867, + "watchers": 868, "score": 0, "subscribers_count": 9 }, diff --git a/2019/CVE-2019-9730.json b/2019/CVE-2019-9730.json index 6dd32bc109..38b9a2cf12 100644 --- a/2019/CVE-2019-9730.json +++ b/2019/CVE-2019-9730.json @@ -14,10 +14,10 @@ "description": "Synaptics Audio Driver LPE", "fork": false, "created_at": "2019-04-14T06:16:34Z", - "updated_at": "2024-12-09T01:44:01Z", + "updated_at": "2025-01-05T19:39:19Z", "pushed_at": "2019-04-15T11:17:39Z", - "stargazers_count": 36, - "watchers_count": 36, + "stargazers_count": 37, + "watchers_count": 37, "has_discussions": false, "forks_count": 13, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 13, - "watchers": 36, + "watchers": 37, "score": 0, "subscribers_count": 4 } diff --git a/2020/CVE-2020-25223.json b/2020/CVE-2020-25223.json index 3c3522b6f7..aa6377546e 100644 --- a/2020/CVE-2020-25223.json +++ b/2020/CVE-2020-25223.json @@ -95,6 +95,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2021/CVE-2021-44967.json b/2021/CVE-2021-44967.json index 4060043595..394507be8b 100644 --- a/2021/CVE-2021-44967.json +++ b/2021/CVE-2021-44967.json @@ -28,6 +28,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2022/CVE-2022-20409.json b/2022/CVE-2022-20409.json index c86cee71fa..ef8025482e 100644 --- a/2022/CVE-2022-20409.json +++ b/2022/CVE-2022-20409.json @@ -14,10 +14,10 @@ "description": "Android kernel exploitation for CVE-2022-20409", "fork": false, "created_at": "2022-11-21T22:42:50Z", - "updated_at": "2024-12-14T16:01:56Z", + "updated_at": "2025-01-05T19:20:06Z", "pushed_at": "2024-10-17T16:26:39Z", - "stargazers_count": 163, - "watchers_count": 163, + "stargazers_count": 164, + "watchers_count": 164, "has_discussions": false, "forks_count": 24, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 24, - "watchers": 163, + "watchers": 164, "score": 0, "subscribers_count": 5 } diff --git a/2022/CVE-2022-21881.json b/2022/CVE-2022-21881.json index a2872b46e4..136e19e732 100644 --- a/2022/CVE-2022-21881.json +++ b/2022/CVE-2022-21881.json @@ -14,10 +14,10 @@ "description": "POC of CVE-2022-21881 exploited at TianfuCup 2021 to escape Chrome Sandbox", "fork": false, "created_at": "2022-08-09T14:16:40Z", - "updated_at": "2024-08-12T20:26:01Z", + "updated_at": "2025-01-05T21:06:50Z", "pushed_at": "2022-08-09T14:28:48Z", - "stargazers_count": 20, - "watchers_count": 20, + "stargazers_count": 19, + "watchers_count": 19, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 20, + "watchers": 19, "score": 0, "subscribers_count": 3 } diff --git a/2022/CVE-2022-21894.json b/2022/CVE-2022-21894.json index ea2a0708d3..99c23b9718 100644 --- a/2022/CVE-2022-21894.json +++ b/2022/CVE-2022-21894.json @@ -14,10 +14,10 @@ "description": "baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability", "fork": false, "created_at": "2022-08-09T15:53:48Z", - "updated_at": "2024-12-30T21:26:37Z", + "updated_at": "2025-01-05T19:08:04Z", "pushed_at": "2023-09-27T06:44:27Z", - "stargazers_count": 318, - "watchers_count": 318, + "stargazers_count": 317, + "watchers_count": 317, "has_discussions": false, "forks_count": 61, "allow_forking": true, @@ -34,7 +34,7 @@ ], "visibility": "public", "forks": 61, - "watchers": 318, + "watchers": 317, "score": 0, "subscribers_count": 11 }, @@ -84,10 +84,10 @@ "description": "An implementation of baton drop (CVE-2022-21894) for armv7 (MSM8960)", "fork": false, "created_at": "2023-03-11T14:38:13Z", - "updated_at": "2024-10-14T17:11:20Z", + "updated_at": "2025-01-05T19:08:06Z", "pushed_at": "2023-03-11T14:46:39Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 10, + "watchers_count": 10, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -96,7 +96,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 11, + "watchers": 10, "score": 0, "subscribers_count": 4 }, diff --git a/2022/CVE-2022-30190.json b/2022/CVE-2022-30190.json index 4e01006350..9269c0926c 100644 --- a/2022/CVE-2022-30190.json +++ b/2022/CVE-2022-30190.json @@ -2542,10 +2542,10 @@ "description": "Follina (CVE-2022-30190) is a Microsoft Office zero-day vulnerability that has recently been discovered. It’s a high-severity vulnerability that hackers can leverage for remote code execution (RCE) attacks.", "fork": false, "created_at": "2023-05-14T13:38:43Z", - "updated_at": "2024-10-09T04:32:05Z", + "updated_at": "2025-01-05T21:18:32Z", "pushed_at": "2023-05-14T13:45:18Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -2554,7 +2554,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 8, + "watchers": 7, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-21554.json b/2023/CVE-2023-21554.json index aeae9e5a80..57860d7700 100644 --- a/2023/CVE-2023-21554.json +++ b/2023/CVE-2023-21554.json @@ -14,10 +14,10 @@ "description": "CVE-2023-21554 Windows MessageQueuing PoC,分析见 https:\/\/www.zoemurmure.top\/posts\/cve_2023_21554\/", "fork": false, "created_at": "2023-05-18T10:30:49Z", - "updated_at": "2024-12-26T10:57:27Z", + "updated_at": "2025-01-05T23:28:20Z", "pushed_at": "2023-05-18T10:38:57Z", - "stargazers_count": 57, - "watchers_count": 57, + "stargazers_count": 56, + "watchers_count": 56, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 15, - "watchers": 57, + "watchers": 56, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-29343.json b/2023/CVE-2023-29343.json index 0c0c6dc931..8995d70366 100644 --- a/2023/CVE-2023-29343.json +++ b/2023/CVE-2023-29343.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2023-06-18T11:14:08Z", - "updated_at": "2024-11-15T16:29:04Z", + "updated_at": "2025-01-05T21:11:25Z", "pushed_at": "2023-06-18T11:51:54Z", - "stargazers_count": 160, - "watchers_count": 160, + "stargazers_count": 159, + "watchers_count": 159, "has_discussions": false, "forks_count": 26, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 26, - "watchers": 160, + "watchers": 159, "score": 0, "subscribers_count": 4 } diff --git a/2023/CVE-2023-38408.json b/2023/CVE-2023-38408.json index 32c2fd39ba..a5f43ff6c8 100644 --- a/2023/CVE-2023-38408.json +++ b/2023/CVE-2023-38408.json @@ -14,10 +14,10 @@ "description": "PoC for the recent critical vuln affecting OpenSSH versions < 9.3p2", "fork": false, "created_at": "2023-08-09T19:56:07Z", - "updated_at": "2024-12-19T17:34:11Z", + "updated_at": "2025-01-05T23:48:35Z", "pushed_at": "2024-11-09T16:38:20Z", - "stargazers_count": 36, - "watchers_count": 36, + "stargazers_count": 35, + "watchers_count": 35, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 36, + "watchers": 35, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index 2e8959d67a..fe5ce4ac05 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -14,10 +14,10 @@ "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "fork": false, "created_at": "2024-01-16T06:52:02Z", - "updated_at": "2025-01-05T17:27:45Z", + "updated_at": "2025-01-05T23:29:00Z", "pushed_at": "2024-08-18T08:26:46Z", - "stargazers_count": 1358, - "watchers_count": 1358, + "stargazers_count": 1361, + "watchers_count": 1361, "has_discussions": false, "forks_count": 229, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 229, - "watchers": 1358, + "watchers": 1361, "score": 0, "subscribers_count": 21 }, diff --git a/2024/CVE-2024-10124.json b/2024/CVE-2024-10124.json index 2b604143c3..bba5738bfd 100644 --- a/2024/CVE-2024-10124.json +++ b/2024/CVE-2024-10124.json @@ -29,5 +29,36 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 912532095, + "name": "CVE-2024-10124-Poc", + "full_name": "Nxploited\/CVE-2024-10124-Poc", + "owner": { + "login": "Nxploited", + "id": 188819918, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188819918?v=4", + "html_url": "https:\/\/github.com\/Nxploited", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Nxploited\/CVE-2024-10124-Poc", + "description": null, + "fork": false, + "created_at": "2025-01-05T20:42:10Z", + "updated_at": "2025-01-05T21:12:38Z", + "pushed_at": "2025-01-05T21:12:34Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-10924.json b/2024/CVE-2024-10924.json index d432d3e049..613e72ef7c 100644 --- a/2024/CVE-2024-10924.json +++ b/2024/CVE-2024-10924.json @@ -113,10 +113,10 @@ "description": "Exploits Really Simple Security < 9.1.2 authentication bypass (CVE-2024-10924).", "fork": false, "created_at": "2024-11-19T10:07:28Z", - "updated_at": "2024-12-22T19:11:03Z", + "updated_at": "2025-01-05T19:08:18Z", "pushed_at": "2024-11-19T12:20:16Z", - "stargazers_count": 19, - "watchers_count": 19, + "stargazers_count": 18, + "watchers_count": 18, "has_discussions": false, "forks_count": 13, "allow_forking": true, @@ -134,7 +134,7 @@ ], "visibility": "public", "forks": 13, - "watchers": 19, + "watchers": 18, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-21413.json b/2024/CVE-2024-21413.json index 0aad7a562f..31c5b79aff 100644 --- a/2024/CVE-2024-21413.json +++ b/2024/CVE-2024-21413.json @@ -200,10 +200,10 @@ "description": "Bu betik, Microsoft Outlook'ta keşfedilen ve CVSS değeri 9.8 olan önemli bir güvenlik açığı olan CVE-2024-21413 için bir kavram kanıtı (PoC) sunmaktadır. MonikerLink hatası olarak adlandırılan bu güvenlik açığı, yerel NTLM bilgilerinin potansiyel sızıntısı ve uzaktan kod çalıştırma olasılığı dahil olmak üzere geniş kapsamlı etkilere sahiptir.", "fork": false, "created_at": "2024-02-23T12:13:11Z", - "updated_at": "2024-10-12T07:56:40Z", + "updated_at": "2025-01-06T00:08:37Z", "pushed_at": "2024-02-24T15:36:22Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -212,7 +212,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 5, + "watchers": 4, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-36401.json b/2024/CVE-2024-36401.json index 2dbb1d2e37..27f34b0359 100644 --- a/2024/CVE-2024-36401.json +++ b/2024/CVE-2024-36401.json @@ -362,10 +362,10 @@ "description": "geoserver图形化漏洞利用工具", "fork": false, "created_at": "2024-10-05T10:08:55Z", - "updated_at": "2024-12-31T08:29:17Z", + "updated_at": "2025-01-06T00:26:18Z", "pushed_at": "2024-10-08T03:16:26Z", - "stargazers_count": 28, - "watchers_count": 28, + "stargazers_count": 29, + "watchers_count": 29, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -374,7 +374,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 28, + "watchers": 29, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-42327.json b/2024/CVE-2024-42327.json index dad9b42326..a881192e9a 100644 --- a/2024/CVE-2024-42327.json +++ b/2024/CVE-2024-42327.json @@ -200,10 +200,10 @@ "description": "Zabbix CVE-2024-42327 PoC", "fork": false, "created_at": "2025-01-01T18:25:44Z", - "updated_at": "2025-01-05T14:59:02Z", + "updated_at": "2025-01-05T19:18:37Z", "pushed_at": "2025-01-03T13:49:03Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -212,7 +212,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 8, + "watchers": 9, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-4367.json b/2024/CVE-2024-4367.json index a3e40e0176..d3bb4b368d 100644 --- a/2024/CVE-2024-4367.json +++ b/2024/CVE-2024-4367.json @@ -340,8 +340,8 @@ "description": "CVE-2024-4367 is a critical vulnerability (CVSS 9.8) in PDF.js, allowing arbitrary JavaScript code execution due to insufficient type checks on the FontMatrix object within PDF files.", "fork": false, "created_at": "2025-01-05T14:44:01Z", - "updated_at": "2025-01-05T15:09:38Z", - "pushed_at": "2025-01-05T15:09:35Z", + "updated_at": "2025-01-05T19:21:53Z", + "pushed_at": "2025-01-05T19:21:50Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2024/CVE-2024-47575.json b/2024/CVE-2024-47575.json index c8d8b8026b..aa078c10fe 100644 --- a/2024/CVE-2024-47575.json +++ b/2024/CVE-2024-47575.json @@ -138,19 +138,19 @@ "description": "CVE POC Exploit", "fork": false, "created_at": "2025-01-05T02:54:01Z", - "updated_at": "2025-01-05T03:06:04Z", + "updated_at": "2025-01-05T23:19:02Z", "pushed_at": "2025-01-05T03:06:01Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, - "watchers": 0, + "forks": 1, + "watchers": 1, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-49113.json b/2024/CVE-2024-49113.json index e19e23a257..fad0f0db27 100644 --- a/2024/CVE-2024-49113.json +++ b/2024/CVE-2024-49113.json @@ -14,10 +14,10 @@ "description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113", "fork": false, "created_at": "2025-01-01T15:48:38Z", - "updated_at": "2025-01-05T14:27:28Z", + "updated_at": "2025-01-05T21:47:07Z", "pushed_at": "2025-01-02T16:07:23Z", - "stargazers_count": 344, - "watchers_count": 344, + "stargazers_count": 347, + "watchers_count": 347, "has_discussions": false, "forks_count": 79, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 79, - "watchers": 344, + "watchers": 347, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-6387.json b/2024/CVE-2024-6387.json index 1708461dd8..d928d75850 100644 --- a/2024/CVE-2024-6387.json +++ b/2024/CVE-2024-6387.json @@ -973,7 +973,7 @@ "description": "CVE-2024-6387 Checker is a fast, efficient tool for detecting OpenSSH servers vulnerable to the regreSSHion exploit. It quickly scans multiple IPs, domain names, and CIDR ranges to identify risks and help secure your infrastructure.", "fork": false, "created_at": "2024-07-02T11:55:39Z", - "updated_at": "2024-09-16T07:16:49Z", + "updated_at": "2025-01-05T23:59:18Z", "pushed_at": "2024-07-08T20:39:03Z", "stargazers_count": 13, "watchers_count": 13, @@ -1159,10 +1159,10 @@ "description": "CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.", "fork": false, "created_at": "2024-07-02T14:41:43Z", - "updated_at": "2025-01-05T15:39:31Z", + "updated_at": "2025-01-05T23:07:03Z", "pushed_at": "2024-07-02T15:16:04Z", - "stargazers_count": 32, - "watchers_count": 32, + "stargazers_count": 31, + "watchers_count": 31, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -1181,7 +1181,7 @@ ], "visibility": "public", "forks": 8, - "watchers": 32, + "watchers": 31, "score": 0, "subscribers_count": 2 }, diff --git a/README.md b/README.md index ff5a157170..c2f7758868 100644 --- a/README.md +++ b/README.md @@ -2047,6 +2047,7 @@ - [RandomRobbieBF/CVE-2024-10124](https://github.com/RandomRobbieBF/CVE-2024-10124) +- [Nxploited/CVE-2024-10124-Poc](https://github.com/Nxploited/CVE-2024-10124-Poc) ### CVE-2024-10140 (2024-10-19)