From de08c7b803b32072a6abf7c4067033160ce9303f Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Wed, 21 Aug 2024 09:29:29 +0900 Subject: [PATCH] Auto Update 2024/08/21 00:29:29 --- 2016/CVE-2016-10956.json | 8 ++++---- 2017/CVE-2017-75.json | 8 ++++---- 2019/CVE-2019-0708.json | 4 ++-- 2019/CVE-2019-19781.json | 2 +- 2019/CVE-2019-8943.json | 2 +- 2021/CVE-2021-44228.json | 8 ++++---- 2023/CVE-2023-22527.json | 8 ++++---- 2023/CVE-2023-29929.json | 32 ++++++++++++++++++++++++++++++++ 2023/CVE-2023-4911.json | 8 ++++---- 2024/CVE-2024-1086.json | 4 ++-- 2024/CVE-2024-21338.json | 8 ++++---- 2024/CVE-2024-25600.json | 32 ++++++++++++++++---------------- 2024/CVE-2024-2961.json | 12 ++++++------ 2024/CVE-2024-30088.json | 8 ++++---- 2024/CVE-2024-32002.json | 8 ++++---- 2024/CVE-2024-33644.json | 32 ++++++++++++++++++++++++++++++++ 2024/CVE-2024-34102.json | 8 ++++---- 2024/CVE-2024-34470.json | 8 ++++---- 2024/CVE-2024-36877.json | 8 ++++---- 2024/CVE-2024-38063.json | 20 ++++++++++---------- 2024/CVE-2024-38189.json | 8 ++++---- 2024/CVE-2024-38475.json | 8 ++++---- 2024/CVE-2024-4577.json | 12 ++++++------ 2024/CVE-2024-6387.json | 24 ++++++++++++------------ 2024/CVE-2024-7339.json | 8 ++++---- 2024/CVE-2024-7928.json | 8 ++++---- README.md | 12 +++++++++++- 27 files changed, 191 insertions(+), 117 deletions(-) create mode 100644 2023/CVE-2023-29929.json create mode 100644 2024/CVE-2024-33644.json diff --git a/2016/CVE-2016-10956.json b/2016/CVE-2016-10956.json index 1524921454..55b4eae851 100644 --- a/2016/CVE-2016-10956.json +++ b/2016/CVE-2016-10956.json @@ -13,10 +13,10 @@ "description": "MailMasta wordpress plugin Local File Inclusion vulnerability (CVE-2016-10956)", "fork": false, "created_at": "2021-12-10T16:06:46Z", - "updated_at": "2024-08-12T20:18:44Z", + "updated_at": "2024-08-20T19:52:46Z", "pushed_at": "2022-05-03T10:37:18Z", - "stargazers_count": 15, - "watchers_count": 15, + "stargazers_count": 16, + "watchers_count": 16, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -33,7 +33,7 @@ ], "visibility": "public", "forks": 2, - "watchers": 15, + "watchers": 16, "score": 0, "subscribers_count": 2 }, diff --git a/2017/CVE-2017-75.json b/2017/CVE-2017-75.json index 63b1127463..77a6a63060 100644 --- a/2017/CVE-2017-75.json +++ b/2017/CVE-2017-75.json @@ -13,10 +13,10 @@ "description": "CVE-2017-7529- Check and EXPLOIT", "fork": false, "created_at": "2023-11-09T17:13:30Z", - "updated_at": "2024-05-01T17:53:28Z", + "updated_at": "2024-08-20T23:55:34Z", "pushed_at": "2024-05-01T17:53:24Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 0, + "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 0, "score": 0, "subscribers_count": 1 } diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 9e61664cdc..d2ef3b29dd 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -1326,13 +1326,13 @@ "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, - "forks_count": 373, + "forks_count": 370, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 373, + "forks": 370, "watchers": 3, "score": 0, "subscribers_count": 0 diff --git a/2019/CVE-2019-19781.json b/2019/CVE-2019-19781.json index eb52d19881..b658a3df83 100644 --- a/2019/CVE-2019-19781.json +++ b/2019/CVE-2019-19781.json @@ -1422,6 +1422,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2019/CVE-2019-8943.json b/2019/CVE-2019-8943.json index f2c97dc447..85c77a6291 100644 --- a/2019/CVE-2019-8943.json +++ b/2019/CVE-2019-8943.json @@ -27,7 +27,7 @@ "forks": 7, "watchers": 19, "score": 0, - "subscribers_count": 1 + "subscribers_count": 0 }, { "id": 539045907, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index a8a4184c92..99da005636 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -5463,10 +5463,10 @@ "description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.", "fork": false, "created_at": "2021-12-14T06:37:59Z", - "updated_at": "2024-08-12T20:18:52Z", + "updated_at": "2024-08-20T19:59:23Z", "pushed_at": "2024-04-24T05:35:26Z", - "stargazers_count": 380, - "watchers_count": 380, + "stargazers_count": 381, + "watchers_count": 381, "has_discussions": false, "forks_count": 53, "allow_forking": true, @@ -5481,7 +5481,7 @@ ], "visibility": "public", "forks": 53, - "watchers": 380, + "watchers": 381, "score": 0, "subscribers_count": 12 }, diff --git a/2023/CVE-2023-22527.json b/2023/CVE-2023-22527.json index d8d7963e27..4c853db546 100644 --- a/2023/CVE-2023-22527.json +++ b/2023/CVE-2023-22527.json @@ -343,10 +343,10 @@ "description": "Atlassian Confluence - Remote Code Execution", "fork": false, "created_at": "2024-01-23T10:55:28Z", - "updated_at": "2024-08-18T20:59:47Z", + "updated_at": "2024-08-20T21:27:37Z", "pushed_at": "2024-01-23T11:30:10Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -355,7 +355,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 8, + "watchers": 9, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-29929.json b/2023/CVE-2023-29929.json new file mode 100644 index 0000000000..3e5fcc8499 --- /dev/null +++ b/2023/CVE-2023-29929.json @@ -0,0 +1,32 @@ +[ + { + "id": 627966808, + "name": "CVE-2023-29929", + "full_name": "YSaxon\/CVE-2023-29929", + "owner": { + "login": "YSaxon", + "id": 11711101, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11711101?v=4", + "html_url": "https:\/\/github.com\/YSaxon" + }, + "html_url": "https:\/\/github.com\/YSaxon\/CVE-2023-29929", + "description": null, + "fork": false, + "created_at": "2023-04-14T15:41:12Z", + "updated_at": "2024-08-20T20:59:12Z", + "pushed_at": "2024-08-20T20:59:08Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 2 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-4911.json b/2023/CVE-2023-4911.json index 62f1fe26be..769e6e90f6 100644 --- a/2023/CVE-2023-4911.json +++ b/2023/CVE-2023-4911.json @@ -287,10 +287,10 @@ "description": "Looney Tunables Local privilege escalation (CVE-2023-4911) workshop", "fork": false, "created_at": "2023-10-25T11:59:34Z", - "updated_at": "2024-06-23T16:46:36Z", + "updated_at": "2024-08-20T21:09:10Z", "pushed_at": "2023-10-25T12:37:38Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -299,7 +299,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 6, + "watchers": 7, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json index ff26ef333a..f55ae76c90 100644 --- a/2024/CVE-2024-1086.json +++ b/2024/CVE-2024-1086.json @@ -199,8 +199,8 @@ "description": null, "fork": false, "created_at": "2024-08-15T01:16:38Z", - "updated_at": "2024-08-16T04:08:06Z", - "pushed_at": "2024-08-16T04:08:02Z", + "updated_at": "2024-08-20T19:49:17Z", + "pushed_at": "2024-08-20T19:49:14Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2024/CVE-2024-21338.json b/2024/CVE-2024-21338.json index 22224282a6..91db55e5ff 100644 --- a/2024/CVE-2024-21338.json +++ b/2024/CVE-2024-21338.json @@ -13,10 +13,10 @@ "description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.", "fork": false, "created_at": "2024-04-13T05:53:02Z", - "updated_at": "2024-08-19T14:12:16Z", + "updated_at": "2024-08-20T21:13:09Z", "pushed_at": "2024-04-16T21:00:14Z", - "stargazers_count": 263, - "watchers_count": 263, + "stargazers_count": 264, + "watchers_count": 264, "has_discussions": false, "forks_count": 59, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 59, - "watchers": 263, + "watchers": 264, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-25600.json b/2024/CVE-2024-25600.json index 2f2cd50339..01ab769e4c 100644 --- a/2024/CVE-2024-25600.json +++ b/2024/CVE-2024-25600.json @@ -198,34 +198,34 @@ "subscribers_count": 1 }, { - "id": 796124892, + "id": 801882404, "name": "CVE-2024-25600-mass", - "full_name": "RHYru9\/CVE-2024-25600-mass", + "full_name": "svchostmm\/CVE-2024-25600-mass", "owner": { - "login": "RHYru9", - "id": 164749781, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164749781?v=4", - "html_url": "https:\/\/github.com\/RHYru9" + "login": "svchostmm", + "id": 169925884, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/169925884?v=4", + "html_url": "https:\/\/github.com\/svchostmm" }, - "html_url": "https:\/\/github.com\/RHYru9\/CVE-2024-25600-mass", + "html_url": "https:\/\/github.com\/svchostmm\/CVE-2024-25600-mass", "description": null, "fork": false, - "created_at": "2024-05-05T02:18:00Z", - "updated_at": "2024-08-03T14:24:47Z", - "pushed_at": "2024-06-12T08:31:18Z", - "stargazers_count": 4, - "watchers_count": 4, + "created_at": "2024-05-17T05:23:51Z", + "updated_at": "2024-05-17T05:23:51Z", + "pushed_at": "2024-05-05T02:22:47Z", + "stargazers_count": 0, + "watchers_count": 0, "has_discussions": false, - "forks_count": 2, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 2, - "watchers": 4, + "forks": 1, + "watchers": 0, "score": 0, - "subscribers_count": 1 + "subscribers_count": 0 }, { "id": 809314858, diff --git a/2024/CVE-2024-2961.json b/2024/CVE-2024-2961.json index ce08531488..d3d3c03223 100644 --- a/2024/CVE-2024-2961.json +++ b/2024/CVE-2024-2961.json @@ -73,19 +73,19 @@ "description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()", "fork": false, "created_at": "2024-05-27T08:30:06Z", - "updated_at": "2024-08-18T16:15:58Z", + "updated_at": "2024-08-20T19:54:54Z", "pushed_at": "2024-07-29T12:20:50Z", - "stargazers_count": 350, - "watchers_count": 350, + "stargazers_count": 351, + "watchers_count": 351, "has_discussions": false, - "forks_count": 46, + "forks_count": 47, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 46, - "watchers": 350, + "forks": 47, + "watchers": 351, "score": 0, "subscribers_count": 7 }, diff --git a/2024/CVE-2024-30088.json b/2024/CVE-2024-30088.json index 631bbeab58..6cf4e50be6 100644 --- a/2024/CVE-2024-30088.json +++ b/2024/CVE-2024-30088.json @@ -133,10 +133,10 @@ "description": "Questa repository contiene una replica (tentativo di replica) scritto in Python per CVE-2024-30088.", "fork": false, "created_at": "2024-07-27T10:41:33Z", - "updated_at": "2024-07-27T16:30:39Z", + "updated_at": "2024-08-20T19:17:32Z", "pushed_at": "2024-07-27T16:30:36Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -145,7 +145,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-32002.json b/2024/CVE-2024-32002.json index 3aaf332e97..5291629188 100644 --- a/2024/CVE-2024-32002.json +++ b/2024/CVE-2024-32002.json @@ -73,10 +73,10 @@ "description": "Exploit PoC for CVE-2024-32002", "fork": false, "created_at": "2024-05-17T19:33:08Z", - "updated_at": "2024-08-15T14:27:57Z", + "updated_at": "2024-08-21T00:02:47Z", "pushed_at": "2024-05-19T07:12:00Z", - "stargazers_count": 483, - "watchers_count": 483, + "stargazers_count": 484, + "watchers_count": 484, "has_discussions": false, "forks_count": 140, "allow_forking": true, @@ -90,7 +90,7 @@ ], "visibility": "public", "forks": 140, - "watchers": 483, + "watchers": 484, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-33644.json b/2024/CVE-2024-33644.json new file mode 100644 index 0000000000..b5efd5fdff --- /dev/null +++ b/2024/CVE-2024-33644.json @@ -0,0 +1,32 @@ +[ + { + "id": 845237835, + "name": "ReproducingCVEs_Akshath_Nagulapally", + "full_name": "Akshath-Nagulapally\/ReproducingCVEs_Akshath_Nagulapally", + "owner": { + "login": "Akshath-Nagulapally", + "id": 140837101, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/140837101?v=4", + "html_url": "https:\/\/github.com\/Akshath-Nagulapally" + }, + "html_url": "https:\/\/github.com\/Akshath-Nagulapally\/ReproducingCVEs_Akshath_Nagulapally", + "description": "Reproducing the following CVEs with dockerfile:CVE-2024-33644 CVE-2024-34370 CVE-2024-22120", + "fork": false, + "created_at": "2024-08-20T21:27:49Z", + "updated_at": "2024-08-20T21:27:53Z", + "pushed_at": "2024-08-20T21:27:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-34102.json b/2024/CVE-2024-34102.json index ea8ecbc5ee..9b660c5892 100644 --- a/2024/CVE-2024-34102.json +++ b/2024/CVE-2024-34102.json @@ -43,10 +43,10 @@ "description": "CVE-2024-34102: Unauthenticated Magento XXE", "fork": false, "created_at": "2024-06-27T18:10:13Z", - "updated_at": "2024-08-14T15:10:50Z", + "updated_at": "2024-08-20T21:27:09Z", "pushed_at": "2024-08-14T15:10:47Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 12, + "watchers_count": 12, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 11, + "watchers": 12, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-34470.json b/2024/CVE-2024-34470.json index 48d150fc55..8ed383fc39 100644 --- a/2024/CVE-2024-34470.json +++ b/2024/CVE-2024-34470.json @@ -133,10 +133,10 @@ "description": "CVE-2024-34470 : An Unauthenticated Path Traversal Vulnerability in HSC Mailinspector", "fork": false, "created_at": "2024-06-23T02:23:57Z", - "updated_at": "2024-07-02T11:42:41Z", + "updated_at": "2024-08-20T21:27:14Z", "pushed_at": "2024-07-02T11:42:37Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -145,7 +145,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-36877.json b/2024/CVE-2024-36877.json index 7064dae481..50f65e47b1 100644 --- a/2024/CVE-2024-36877.json +++ b/2024/CVE-2024-36877.json @@ -13,10 +13,10 @@ "description": "Exploit POC for CVE-2024-36877", "fork": false, "created_at": "2024-08-09T15:33:04Z", - "updated_at": "2024-08-20T14:38:33Z", + "updated_at": "2024-08-20T19:06:12Z", "pushed_at": "2024-08-14T15:26:18Z", - "stargazers_count": 29, - "watchers_count": 29, + "stargazers_count": 30, + "watchers_count": 30, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 29, + "watchers": 30, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-38063.json b/2024/CVE-2024-38063.json index 6cb73fea57..18cbef9560 100644 --- a/2024/CVE-2024-38063.json +++ b/2024/CVE-2024-38063.json @@ -13,10 +13,10 @@ "description": "mitigation script by disabling ipv6 of all interfaces", "fork": false, "created_at": "2024-08-15T12:41:01Z", - "updated_at": "2024-08-17T18:27:05Z", + "updated_at": "2024-08-20T22:58:52Z", "pushed_at": "2024-08-15T13:53:45Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 13, + "watchers_count": 13, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 12, + "watchers": 13, "score": 0, "subscribers_count": 1 }, @@ -73,19 +73,19 @@ "description": "Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.", "fork": false, "created_at": "2024-08-17T14:58:36Z", - "updated_at": "2024-08-20T18:21:06Z", + "updated_at": "2024-08-21T00:26:49Z", "pushed_at": "2024-08-17T15:12:43Z", - "stargazers_count": 26, - "watchers_count": 26, + "stargazers_count": 30, + "watchers_count": 30, "has_discussions": false, - "forks_count": 10, + "forks_count": 12, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 10, - "watchers": 26, + "forks": 12, + "watchers": 30, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-38189.json b/2024/CVE-2024-38189.json index 91ce79ea83..314029095e 100644 --- a/2024/CVE-2024-38189.json +++ b/2024/CVE-2024-38189.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2024-08-20T12:41:57Z", - "updated_at": "2024-08-20T15:36:48Z", + "updated_at": "2024-08-21T00:23:24Z", "pushed_at": "2024-08-20T15:36:45Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-38475.json b/2024/CVE-2024-38475.json index e3df8c7aad..1ca82e4a8c 100644 --- a/2024/CVE-2024-38475.json +++ b/2024/CVE-2024-38475.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2024-08-18T11:30:50Z", - "updated_at": "2024-08-19T13:00:48Z", + "updated_at": "2024-08-21T00:23:27Z", "pushed_at": "2024-08-18T12:27:30Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-4577.json b/2024/CVE-2024-4577.json index 3b0698f64a..faa0351bf6 100644 --- a/2024/CVE-2024-4577.json +++ b/2024/CVE-2024-4577.json @@ -163,19 +163,19 @@ "description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC", "fork": false, "created_at": "2024-06-07T09:52:54Z", - "updated_at": "2024-08-17T09:33:00Z", + "updated_at": "2024-08-20T20:57:16Z", "pushed_at": "2024-06-22T15:13:52Z", - "stargazers_count": 189, - "watchers_count": 189, + "stargazers_count": 190, + "watchers_count": 190, "has_discussions": false, - "forks_count": 42, + "forks_count": 43, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 42, - "watchers": 189, + "forks": 43, + "watchers": 190, "score": 0, "subscribers_count": 4 }, diff --git a/2024/CVE-2024-6387.json b/2024/CVE-2024-6387.json index b918a4518c..da0fafe4ea 100644 --- a/2024/CVE-2024-6387.json +++ b/2024/CVE-2024-6387.json @@ -697,13 +697,13 @@ "stargazers_count": 15, "watchers_count": 15, "has_discussions": false, - "forks_count": 4, + "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 4, + "forks": 5, "watchers": 15, "score": 0, "subscribers_count": 1 @@ -1343,10 +1343,10 @@ "description": "CVE-2024-6387 : Vulnerability Detection tool for regreSSHion Remote Unauthenticated Code Execution in OpenSSH Server", "fork": false, "created_at": "2024-07-02T17:04:52Z", - "updated_at": "2024-07-10T13:48:18Z", + "updated_at": "2024-08-20T21:26:57Z", "pushed_at": "2024-07-02T17:47:29Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -1355,7 +1355,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 }, @@ -1662,10 +1662,10 @@ "description": "SSH Exploit for CVE-2024-6387 : RCE in OpenSSH's server, on glibc-based Linux systems", "fork": false, "created_at": "2024-07-03T08:22:57Z", - "updated_at": "2024-07-31T06:59:40Z", + "updated_at": "2024-08-20T21:05:45Z", "pushed_at": "2024-07-04T15:07:21Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -1681,7 +1681,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 3, + "watchers": 2, "score": 0, "subscribers_count": 1 }, @@ -2778,13 +2778,13 @@ "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-7339.json b/2024/CVE-2024-7339.json index ad6c3fefb4..6e5ea90418 100644 --- a/2024/CVE-2024-7339.json +++ b/2024/CVE-2024-7339.json @@ -13,10 +13,10 @@ "description": "An Vulnerability detection and Exploitation tool for CVE-2024-7339", "fork": false, "created_at": "2024-08-05T16:26:18Z", - "updated_at": "2024-08-20T07:40:29Z", + "updated_at": "2024-08-20T21:25:50Z", "pushed_at": "2024-08-10T17:38:53Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 13, + "watchers_count": 13, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 12, + "watchers": 13, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-7928.json b/2024/CVE-2024-7928.json index 981dbdc43c..287e9d2e08 100644 --- a/2024/CVE-2024-7928.json +++ b/2024/CVE-2024-7928.json @@ -13,10 +13,10 @@ "description": "Will attempt to retrieve DB details for FastAdmin instances", "fork": false, "created_at": "2024-08-20T03:09:47Z", - "updated_at": "2024-08-20T14:22:25Z", + "updated_at": "2024-08-20T22:14:16Z", "pushed_at": "2024-08-20T03:21:56Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 10, + "watchers_count": 10, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 8, + "watchers": 10, "score": 0, "subscribers_count": 0 } diff --git a/README.md b/README.md index 84073f5727..0c44f9895d 100644 --- a/README.md +++ b/README.md @@ -2323,7 +2323,7 @@ - [hy011121/CVE-2024-25600-wordpress-Exploit-RCE](https://github.com/hy011121/CVE-2024-25600-wordpress-Exploit-RCE) - [K3ysTr0K3R/CVE-2024-25600-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2024-25600-EXPLOIT) - [X-Projetion/WORDPRESS-CVE-2024-25600-EXPLOIT-RCE](https://github.com/X-Projetion/WORDPRESS-CVE-2024-25600-EXPLOIT-RCE) -- [RHYru9/CVE-2024-25600-mass](https://github.com/RHYru9/CVE-2024-25600-mass) +- [svchostmm/CVE-2024-25600-mass](https://github.com/svchostmm/CVE-2024-25600-mass) - [ivanbg2004/0BL1V10N-CVE-2024-25600-Bricks-Builder-plugin-for-WordPress](https://github.com/ivanbg2004/0BL1V10N-CVE-2024-25600-Bricks-Builder-plugin-for-WordPress) - [k3lpi3b4nsh33/CVE-2024-25600](https://github.com/k3lpi3b4nsh33/CVE-2024-25600) - [WanLiChangChengWanLiChang/CVE-2024-25600](https://github.com/WanLiChangChengWanLiChang/CVE-2024-25600) @@ -3314,6 +3314,13 @@ - [absholi7ly/WordPress-XStore-theme-SQL-Injection](https://github.com/absholi7ly/WordPress-XStore-theme-SQL-Injection) +### CVE-2024-33644 (2024-05-17) + +Improper Control of Generation of Code ('Code Injection') vulnerability in WPCustomify Customify Site Library allows Code Injection.This issue affects Customify Site Library: from n/a through 0.0.9. + + +- [Akshath-Nagulapally/ReproducingCVEs_Akshath_Nagulapally](https://github.com/Akshath-Nagulapally/ReproducingCVEs_Akshath_Nagulapally) + ### CVE-2024-33722 - [fuzzlove/soplanning-1.52-exploits](https://github.com/fuzzlove/soplanning-1.52-exploits) @@ -7634,6 +7641,9 @@ - [3yujw7njai/CVE-2023-29923-Scan](https://github.com/3yujw7njai/CVE-2023-29923-Scan) - [Le1a/CVE-2023-29923](https://github.com/Le1a/CVE-2023-29923) +### CVE-2023-29929 +- [YSaxon/CVE-2023-29929](https://github.com/YSaxon/CVE-2023-29929) + ### CVE-2023-29930 (2023-05-10) An issue was found in Genesys CIC Polycom phone provisioning TFTP Server all version allows a remote attacker to execute arbitrary code via the login crednetials to the TFTP server configuration page.