From e21dc5c7a1b3e9649924dcd0bb4d38d7321da8e6 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Sat, 21 Dec 2024 03:31:43 +0900 Subject: [PATCH] Auto Update 2024/12/20 18:31:43 --- 2014/CVE-2014-0160.json | 16 ++++++++-------- 2017/CVE-2017-12617.json | 8 ++++---- 2019/CVE-2019-0708.json | 16 ++++++++-------- 2020/CVE-2020-0601.json | 8 ++++---- 2020/CVE-2020-0787.json | 12 ++++++------ 2020/CVE-2020-14883.json | 8 ++++---- 2020/CVE-2020-17087.json | 2 +- 2021/CVE-2021-21972.json | 8 ++++---- 2021/CVE-2021-25646.json | 8 ++++---- 2021/CVE-2021-30481.json | 4 ++-- 2021/CVE-2021-4034.json | 8 ++++---- 2021/CVE-2021-42287.json | 8 ++++---- 2022/CVE-2022-22954.json | 8 ++++---- 2022/CVE-2022-24834.json | 4 ++-- 2022/CVE-2022-46463.json | 8 ++++---- 2023/CVE-2023-21768.json | 8 ++++---- 2023/CVE-2023-26269.json | 8 ++++---- 2023/CVE-2023-45866.json | 39 +++++++++++++++++++++++++++++++++++---- 2024/CVE-2024-1086.json | 4 ++-- 2024/CVE-2024-21111.json | 8 ++++---- 2024/CVE-2024-21893.json | 8 ++++---- 2024/CVE-2024-29404.json | 8 ++++---- 2024/CVE-2024-3094.json | 8 ++++---- 2024/CVE-2024-35176.json | 8 ++++---- 2024/CVE-2024-35250.json | 8 ++++---- 2024/CVE-2024-4577.json | 8 ++++---- 2024/CVE-2024-50379.json | 8 ++++---- 2024/CVE-2024-53677.json | 6 +++--- 2024/CVE-2024-56145.json | 12 ++++++------ 2024/CVE-2024-7954.json | 31 +++++++++++++++++++++++++++++++ README.md | 4 +++- 31 files changed, 183 insertions(+), 119 deletions(-) diff --git a/2014/CVE-2014-0160.json b/2014/CVE-2014-0160.json index 4d179e7e48..c07c492731 100644 --- a/2014/CVE-2014-0160.json +++ b/2014/CVE-2014-0160.json @@ -14,10 +14,10 @@ "description": "A checker (site and tool) for CVE-2014-0160", "fork": false, "created_at": "2014-04-07T23:03:09Z", - "updated_at": "2024-12-17T06:35:39Z", + "updated_at": "2024-12-20T15:53:58Z", "pushed_at": "2021-02-24T09:17:24Z", - "stargazers_count": 2306, - "watchers_count": 2306, + "stargazers_count": 2307, + "watchers_count": 2307, "has_discussions": false, "forks_count": 461, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 461, - "watchers": 2306, + "watchers": 2307, "score": 0, "subscribers_count": 117 }, @@ -45,10 +45,10 @@ "description": "OpenSSL CVE-2014-0160 Heartbleed vulnerability test", "fork": false, "created_at": "2014-04-08T04:25:23Z", - "updated_at": "2024-08-30T12:43:24Z", + "updated_at": "2024-12-20T15:54:03Z", "pushed_at": "2014-05-27T22:32:26Z", - "stargazers_count": 449, - "watchers_count": 449, + "stargazers_count": 450, + "watchers_count": 450, "has_discussions": false, "forks_count": 86, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 86, - "watchers": 449, + "watchers": 450, "score": 0, "subscribers_count": 30 }, diff --git a/2017/CVE-2017-12617.json b/2017/CVE-2017-12617.json index b6d26e8c9e..9b492ce4a1 100644 --- a/2017/CVE-2017-12617.json +++ b/2017/CVE-2017-12617.json @@ -144,10 +144,10 @@ "description": "Apache Tomcat < 9.0.1 (Beta) \/ < 8.5.23 \/ < 8.0.47 \/ < 7.0.8 - JSP Upload Bypass \/ Remote Code Execution for Python3", "fork": false, "created_at": "2021-02-04T04:28:21Z", - "updated_at": "2021-07-03T19:27:11Z", + "updated_at": "2024-12-20T16:08:18Z", "pushed_at": "2021-07-03T19:27:09Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -156,7 +156,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 }, diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 5bd1be7894..209f203753 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -1618,10 +1618,10 @@ "description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.", "fork": false, "created_at": "2019-05-23T22:50:12Z", - "updated_at": "2024-12-18T21:54:31Z", + "updated_at": "2024-12-20T15:34:21Z", "pushed_at": "2019-06-22T21:48:45Z", - "stargazers_count": 897, - "watchers_count": 897, + "stargazers_count": 898, + "watchers_count": 898, "has_discussions": false, "forks_count": 242, "allow_forking": true, @@ -1630,7 +1630,7 @@ "topics": [], "visibility": "public", "forks": 242, - "watchers": 897, + "watchers": 898, "score": 0, "subscribers_count": 55 }, @@ -3179,10 +3179,10 @@ "description": "CVE-2019-0708 (BlueKeep) proof of concept allowing pre-auth RCE on Windows7", "fork": false, "created_at": "2020-03-15T19:33:53Z", - "updated_at": "2024-11-27T01:50:25Z", + "updated_at": "2024-12-20T16:56:29Z", "pushed_at": "2022-03-28T04:10:20Z", - "stargazers_count": 132, - "watchers_count": 132, + "stargazers_count": 131, + "watchers_count": 131, "has_discussions": false, "forks_count": 21, "allow_forking": true, @@ -3191,7 +3191,7 @@ "topics": [], "visibility": "public", "forks": 21, - "watchers": 132, + "watchers": 131, "score": 0, "subscribers_count": 4 }, diff --git a/2020/CVE-2020-0601.json b/2020/CVE-2020-0601.json index a208b87099..a92f2cb4c8 100644 --- a/2020/CVE-2020-0601.json +++ b/2020/CVE-2020-0601.json @@ -238,10 +238,10 @@ "description": "😂An awesome curated list of repos for CVE-2020-0601.", "fork": false, "created_at": "2020-01-16T02:46:21Z", - "updated_at": "2024-08-12T19:56:41Z", + "updated_at": "2024-12-20T15:50:46Z", "pushed_at": "2020-02-02T02:29:23Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -255,7 +255,7 @@ ], "visibility": "public", "forks": 2, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 0 }, diff --git a/2020/CVE-2020-0787.json b/2020/CVE-2020-0787.json index 9cebd14c09..0ddab1d19c 100644 --- a/2020/CVE-2020-0787.json +++ b/2020/CVE-2020-0787.json @@ -14,19 +14,19 @@ "description": "Support ALL Windows Version", "fork": false, "created_at": "2020-06-16T08:57:51Z", - "updated_at": "2024-12-10T05:19:06Z", + "updated_at": "2024-12-20T14:54:42Z", "pushed_at": "2020-09-11T07:38:22Z", - "stargazers_count": 713, - "watchers_count": 713, + "stargazers_count": 714, + "watchers_count": 714, "has_discussions": false, - "forks_count": 173, + "forks_count": 174, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 173, - "watchers": 713, + "forks": 174, + "watchers": 714, "score": 0, "subscribers_count": 19 }, diff --git a/2020/CVE-2020-14883.json b/2020/CVE-2020-14883.json index d91f6a5095..894fedc4cd 100644 --- a/2020/CVE-2020-14883.json +++ b/2020/CVE-2020-14883.json @@ -138,10 +138,10 @@ "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE", "fork": false, "created_at": "2021-03-11T22:49:17Z", - "updated_at": "2024-12-16T13:58:02Z", + "updated_at": "2024-12-20T15:10:07Z", "pushed_at": "2023-05-11T14:36:58Z", - "stargazers_count": 1080, - "watchers_count": 1080, + "stargazers_count": 1081, + "watchers_count": 1081, "has_discussions": false, "forks_count": 318, "allow_forking": true, @@ -154,7 +154,7 @@ ], "visibility": "public", "forks": 318, - "watchers": 1080, + "watchers": 1081, "score": 0, "subscribers_count": 36 }, diff --git a/2020/CVE-2020-17087.json b/2020/CVE-2020-17087.json index 1c2c3db056..06576584cb 100644 --- a/2020/CVE-2020-17087.json +++ b/2020/CVE-2020-17087.json @@ -76,7 +76,7 @@ "description": "Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CVE-2020-17087 and an off-by-one overflow", "fork": false, "created_at": "2021-07-02T16:03:16Z", - "updated_at": "2024-12-08T21:33:48Z", + "updated_at": "2024-12-20T13:18:34Z", "pushed_at": "2022-09-01T06:33:36Z", "stargazers_count": 184, "watchers_count": 184, diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index 2f95dfa0cf..46ee0074f6 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -848,10 +848,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2024-12-20T11:55:13Z", + "updated_at": "2024-12-20T16:42:37Z", "pushed_at": "2024-04-25T06:09:38Z", - "stargazers_count": 1345, - "watchers_count": 1345, + "stargazers_count": 1346, + "watchers_count": 1346, "has_discussions": false, "forks_count": 166, "allow_forking": true, @@ -867,7 +867,7 @@ ], "visibility": "public", "forks": 166, - "watchers": 1345, + "watchers": 1346, "score": 0, "subscribers_count": 15 } diff --git a/2021/CVE-2021-25646.json b/2021/CVE-2021-25646.json index e8e0031a39..e769a4b121 100644 --- a/2021/CVE-2021-25646.json +++ b/2021/CVE-2021-25646.json @@ -138,10 +138,10 @@ "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE", "fork": false, "created_at": "2021-03-11T22:49:17Z", - "updated_at": "2024-12-16T13:58:02Z", + "updated_at": "2024-12-20T15:10:07Z", "pushed_at": "2023-05-11T14:36:58Z", - "stargazers_count": 1080, - "watchers_count": 1080, + "stargazers_count": 1081, + "watchers_count": 1081, "has_discussions": false, "forks_count": 318, "allow_forking": true, @@ -154,7 +154,7 @@ ], "visibility": "public", "forks": 318, - "watchers": 1080, + "watchers": 1081, "score": 0, "subscribers_count": 36 }, diff --git a/2021/CVE-2021-30481.json b/2021/CVE-2021-30481.json index 7e7211d7eb..95aeff82ba 100644 --- a/2021/CVE-2021-30481.json +++ b/2021/CVE-2021-30481.json @@ -45,8 +45,8 @@ "description": "Results of my research I have done on CVE-2021-30481 and on wallhacks in the videogame Counter-Strike 2", "fork": false, "created_at": "2024-05-31T09:43:39Z", - "updated_at": "2024-12-19T16:14:05Z", - "pushed_at": "2024-12-19T16:14:01Z", + "updated_at": "2024-12-20T14:47:16Z", + "pushed_at": "2024-12-20T14:47:12Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index 7beb75c418..caa1868df0 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -967,10 +967,10 @@ "description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation", "fork": false, "created_at": "2022-01-26T14:26:10Z", - "updated_at": "2024-12-20T11:33:35Z", + "updated_at": "2024-12-20T18:15:39Z", "pushed_at": "2022-06-21T14:52:05Z", - "stargazers_count": 1093, - "watchers_count": 1093, + "stargazers_count": 1092, + "watchers_count": 1092, "has_discussions": false, "forks_count": 190, "allow_forking": true, @@ -981,7 +981,7 @@ ], "visibility": "public", "forks": 190, - "watchers": 1093, + "watchers": 1092, "score": 0, "subscribers_count": 13 }, diff --git a/2021/CVE-2021-42287.json b/2021/CVE-2021-42287.json index 3d8a78d518..a46e354ff8 100644 --- a/2021/CVE-2021-42287.json +++ b/2021/CVE-2021-42287.json @@ -14,10 +14,10 @@ "description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.", "fork": false, "created_at": "2021-12-11T19:27:30Z", - "updated_at": "2024-12-20T11:55:12Z", + "updated_at": "2024-12-20T13:18:25Z", "pushed_at": "2021-12-16T09:50:15Z", - "stargazers_count": 1346, - "watchers_count": 1346, + "stargazers_count": 1347, + "watchers_count": 1347, "has_discussions": false, "forks_count": 322, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 322, - "watchers": 1346, + "watchers": 1347, "score": 0, "subscribers_count": 27 }, diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json index ad94cf9828..cb9b1ce257 100644 --- a/2022/CVE-2022-22954.json +++ b/2022/CVE-2022-22954.json @@ -792,10 +792,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2024-12-20T11:55:13Z", + "updated_at": "2024-12-20T16:42:37Z", "pushed_at": "2024-04-25T06:09:38Z", - "stargazers_count": 1345, - "watchers_count": 1345, + "stargazers_count": 1346, + "watchers_count": 1346, "has_discussions": false, "forks_count": 166, "allow_forking": true, @@ -811,7 +811,7 @@ ], "visibility": "public", "forks": 166, - "watchers": 1345, + "watchers": 1346, "score": 0, "subscribers_count": 15 } diff --git a/2022/CVE-2022-24834.json b/2022/CVE-2022-24834.json index 38d2c9ec2e..5be251cabb 100644 --- a/2022/CVE-2022-24834.json +++ b/2022/CVE-2022-24834.json @@ -19,13 +19,13 @@ "stargazers_count": 22, "watchers_count": 22, "has_discussions": false, - "forks_count": 5, + "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 5, + "forks": 6, "watchers": 22, "score": 0, "subscribers_count": 3 diff --git a/2022/CVE-2022-46463.json b/2022/CVE-2022-46463.json index 080ad6c8d6..bc4a0b2a90 100644 --- a/2022/CVE-2022-46463.json +++ b/2022/CVE-2022-46463.json @@ -45,10 +45,10 @@ "description": "harbor unauthorized detection", "fork": false, "created_at": "2023-03-21T10:40:19Z", - "updated_at": "2024-12-12T07:37:05Z", + "updated_at": "2024-12-20T12:32:30Z", "pushed_at": "2024-12-12T07:37:01Z", - "stargazers_count": 26, - "watchers_count": 26, + "stargazers_count": 27, + "watchers_count": 27, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 26, + "watchers": 27, "score": 0, "subscribers_count": 2 } diff --git a/2023/CVE-2023-21768.json b/2023/CVE-2023-21768.json index 90113a9fc2..53941ca7cb 100644 --- a/2023/CVE-2023-21768.json +++ b/2023/CVE-2023-21768.json @@ -14,10 +14,10 @@ "description": "LPE exploit for CVE-2023-21768", "fork": false, "created_at": "2023-03-07T23:00:27Z", - "updated_at": "2024-12-11T09:20:43Z", + "updated_at": "2024-12-20T16:45:50Z", "pushed_at": "2023-07-10T16:35:49Z", - "stargazers_count": 485, - "watchers_count": 485, + "stargazers_count": 486, + "watchers_count": 486, "has_discussions": false, "forks_count": 163, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 163, - "watchers": 485, + "watchers": 486, "score": 0, "subscribers_count": 10 }, diff --git a/2023/CVE-2023-26269.json b/2023/CVE-2023-26269.json index e1495b7143..4cc7f1d4d7 100644 --- a/2023/CVE-2023-26269.json +++ b/2023/CVE-2023-26269.json @@ -14,10 +14,10 @@ "description": "CVE-2023-26269: Misconfigured JMX in Apache James", "fork": false, "created_at": "2023-11-23T21:55:30Z", - "updated_at": "2023-11-26T12:24:28Z", + "updated_at": "2024-12-20T14:21:01Z", "pushed_at": "2023-11-23T22:10:35Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -34,7 +34,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index 1ca35dd319..93837ab584 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -14,10 +14,10 @@ "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "fork": false, "created_at": "2024-01-16T06:52:02Z", - "updated_at": "2024-12-19T19:33:11Z", + "updated_at": "2024-12-20T13:21:17Z", "pushed_at": "2024-08-18T08:26:46Z", - "stargazers_count": 1304, - "watchers_count": 1304, + "stargazers_count": 1305, + "watchers_count": 1305, "has_discussions": false, "forks_count": 221, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 221, - "watchers": 1304, + "watchers": 1305, "score": 0, "subscribers_count": 21 }, @@ -215,5 +215,36 @@ "watchers": 5, "score": 0, "subscribers_count": 1 + }, + { + "id": 906344035, + "name": "RustyInjector", + "full_name": "xG3nesis\/RustyInjector", + "owner": { + "login": "xG3nesis", + "id": 83365854, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83365854?v=4", + "html_url": "https:\/\/github.com\/xG3nesis", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/xG3nesis\/RustyInjector", + "description": "Rust implementation of Marc Newlin's keystroke injection proof of concept (CVE-2023-45866).", + "fork": false, + "created_at": "2024-12-20T17:28:48Z", + "updated_at": "2024-12-20T18:17:10Z", + "pushed_at": "2024-12-20T18:14:38Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json index dd0ea86bca..1ee3e4685f 100644 --- a/2024/CVE-2024-1086.json +++ b/2024/CVE-2024-1086.json @@ -211,13 +211,13 @@ "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 2, "watchers": 7, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-21111.json b/2024/CVE-2024-21111.json index 80bb7a24f1..d0faa84596 100644 --- a/2024/CVE-2024-21111.json +++ b/2024/CVE-2024-21111.json @@ -14,10 +14,10 @@ "description": "Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability", "fork": false, "created_at": "2024-04-22T07:05:04Z", - "updated_at": "2024-11-21T05:24:13Z", + "updated_at": "2024-12-20T15:01:42Z", "pushed_at": "2024-05-09T16:39:55Z", - "stargazers_count": 216, - "watchers_count": 216, + "stargazers_count": 217, + "watchers_count": 217, "has_discussions": false, "forks_count": 35, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 35, - "watchers": 216, + "watchers": 217, "score": 0, "subscribers_count": 5 }, diff --git a/2024/CVE-2024-21893.json b/2024/CVE-2024-21893.json index 8c9be6edf5..f7ac0f419f 100644 --- a/2024/CVE-2024-21893.json +++ b/2024/CVE-2024-21893.json @@ -45,10 +45,10 @@ "description": "CVE-2024-21893 to CVE-2024-21887 Exploit Toolkit", "fork": false, "created_at": "2024-02-03T11:33:40Z", - "updated_at": "2024-09-27T09:59:10Z", + "updated_at": "2024-12-20T14:07:58Z", "pushed_at": "2024-02-03T11:48:37Z", - "stargazers_count": 25, - "watchers_count": 25, + "stargazers_count": 26, + "watchers_count": 26, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 25, + "watchers": 26, "score": 0, "subscribers_count": 2 } diff --git a/2024/CVE-2024-29404.json b/2024/CVE-2024-29404.json index 0be8aaad35..289d4ccfce 100644 --- a/2024/CVE-2024-29404.json +++ b/2024/CVE-2024-29404.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2024-11-24T13:43:36Z", - "updated_at": "2024-11-27T12:03:02Z", + "updated_at": "2024-12-20T15:01:41Z", "pushed_at": "2024-11-27T12:02:59Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-3094.json b/2024/CVE-2024-3094.json index 2d0196a244..200139cff5 100644 --- a/2024/CVE-2024-3094.json +++ b/2024/CVE-2024-3094.json @@ -1856,10 +1856,10 @@ "description": "CVE-2024-3094 (XZ Backdoor) Tools", "fork": false, "created_at": "2024-12-01T05:22:08Z", - "updated_at": "2024-12-08T18:31:57Z", + "updated_at": "2024-12-20T17:22:03Z", "pushed_at": "2024-12-01T05:30:15Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -1868,7 +1868,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-35176.json b/2024/CVE-2024-35176.json index 2d6f4f6ef5..3087166cda 100644 --- a/2024/CVE-2024-35176.json +++ b/2024/CVE-2024-35176.json @@ -14,10 +14,10 @@ "description": "CVE-2024-35176 poc full", "fork": false, "created_at": "2024-12-19T19:01:53Z", - "updated_at": "2024-12-20T04:36:02Z", + "updated_at": "2024-12-20T18:19:26Z", "pushed_at": "2024-12-19T22:16:06Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-35250.json b/2024/CVE-2024-35250.json index 87359d7831..5dc3b0d6d8 100644 --- a/2024/CVE-2024-35250.json +++ b/2024/CVE-2024-35250.json @@ -14,10 +14,10 @@ "description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver", "fork": false, "created_at": "2024-10-13T19:30:20Z", - "updated_at": "2024-12-20T11:19:12Z", + "updated_at": "2024-12-20T14:02:51Z", "pushed_at": "2024-11-29T16:56:23Z", - "stargazers_count": 244, - "watchers_count": 244, + "stargazers_count": 245, + "watchers_count": 245, "has_discussions": false, "forks_count": 53, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 53, - "watchers": 244, + "watchers": 245, "score": 0, "subscribers_count": 6 }, diff --git a/2024/CVE-2024-4577.json b/2024/CVE-2024-4577.json index 1a90485b2b..6bc566dbd2 100644 --- a/2024/CVE-2024-4577.json +++ b/2024/CVE-2024-4577.json @@ -510,10 +510,10 @@ "description": "PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template", "fork": false, "created_at": "2024-06-08T12:23:35Z", - "updated_at": "2024-12-15T22:43:59Z", + "updated_at": "2024-12-20T16:00:38Z", "pushed_at": "2024-06-19T16:19:57Z", - "stargazers_count": 25, - "watchers_count": 25, + "stargazers_count": 26, + "watchers_count": 26, "has_discussions": false, "forks_count": 10, "allow_forking": true, @@ -529,7 +529,7 @@ ], "visibility": "public", "forks": 10, - "watchers": 25, + "watchers": 26, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-50379.json b/2024/CVE-2024-50379.json index f1c3ad993b..eacf661355 100644 --- a/2024/CVE-2024-50379.json +++ b/2024/CVE-2024-50379.json @@ -76,10 +76,10 @@ "description": "Apache Tomcat(CVE-2024-50379)条件竞争致远程代码执行漏洞批量检测脚本", "fork": false, "created_at": "2024-12-20T05:24:10Z", - "updated_at": "2024-12-20T07:49:45Z", + "updated_at": "2024-12-20T16:26:15Z", "pushed_at": "2024-12-20T05:41:23Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-53677.json b/2024/CVE-2024-53677.json index e1c9eec2e5..c3480099e7 100644 --- a/2024/CVE-2024-53677.json +++ b/2024/CVE-2024-53677.json @@ -50,13 +50,13 @@ "stargazers_count": 63, "watchers_count": 63, "has_discussions": false, - "forks_count": 26, + "forks_count": 27, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 26, + "forks": 27, "watchers": 63, "score": 0, "subscribers_count": 3 @@ -107,7 +107,7 @@ "description": "A Docker-based environment to reproduce the CVE-2024-53677 vulnerability in Apache Struts 2. ", "fork": false, "created_at": "2024-12-17T06:42:16Z", - "updated_at": "2024-12-19T05:46:48Z", + "updated_at": "2024-12-20T15:57:49Z", "pushed_at": "2024-12-17T07:01:11Z", "stargazers_count": 3, "watchers_count": 3, diff --git a/2024/CVE-2024-56145.json b/2024/CVE-2024-56145.json index 5e03e12054..7b91c9368e 100644 --- a/2024/CVE-2024-56145.json +++ b/2024/CVE-2024-56145.json @@ -14,19 +14,19 @@ "description": "Unauthenticated RCE on CraftCMS when PHP `register_argc_argv` config setting is enabled", "fork": false, "created_at": "2024-12-20T03:34:01Z", - "updated_at": "2024-12-20T10:53:27Z", + "updated_at": "2024-12-20T16:05:03Z", "pushed_at": "2024-12-20T04:26:44Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 10, + "watchers_count": 10, "has_discussions": false, - "forks_count": 2, + "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 2, - "watchers": 6, + "forks": 3, + "watchers": 10, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-7954.json b/2024/CVE-2024-7954.json index b8b02d2e62..0f0a228d41 100644 --- a/2024/CVE-2024-7954.json +++ b/2024/CVE-2024-7954.json @@ -184,5 +184,36 @@ "watchers": 1, "score": 0, "subscribers_count": 1 + }, + { + "id": 906301837, + "name": "CVE-2024-7954POC", + "full_name": "zxj-hub\/CVE-2024-7954POC", + "owner": { + "login": "zxj-hub", + "id": 192207002, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/192207002?v=4", + "html_url": "https:\/\/github.com\/zxj-hub", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/zxj-hub\/CVE-2024-7954POC", + "description": "SPIP 4.30-alpha2、4.2.13、4.1.16之前的版本使用的porte_plume插件存在任意代码执行漏洞,远程未经身份验证的攻击者可以通过发送精心设计的HTTP 请求以SPIP用户身份执行任意PHP代码。", + "fork": false, + "created_at": "2024-12-20T15:40:35Z", + "updated_at": "2024-12-20T15:40:39Z", + "pushed_at": "2024-12-20T15:40:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index e97dd95aa2..a30ecc3590 100644 --- a/README.md +++ b/README.md @@ -1647,6 +1647,7 @@ - [TheCyberguy-17/RCE_CVE-2024-7954](https://github.com/TheCyberguy-17/RCE_CVE-2024-7954) - [MuhammadWaseem29/RCE-CVE-2024-7954](https://github.com/MuhammadWaseem29/RCE-CVE-2024-7954) - [issamjr/CVE-2024-7954](https://github.com/issamjr/CVE-2024-7954) +- [zxj-hub/CVE-2024-7954POC](https://github.com/zxj-hub/CVE-2024-7954POC) ### CVE-2024-7965 (2024-08-21) @@ -7561,7 +7562,7 @@ ### CVE-2024-53677 (2024-12-11) -File upload logic is flawed vulnerability in Apache Struts.\n\nThis issue affects Apache Struts: from 2.0.0 before 6.4.0.\n\nUsers are recommended to upgrade to version 6.4.0 and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload .\n\nYou can find more details in  https://cwiki.apache.org/confluence/display/WW/S2-067 +File upload logic in Apache Struts is flawed. An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.\n\nThis issue affects Apache Struts: from 2.0.0 before 6.4.0.\n\nUsers are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload . If you are not using an old file upload logic based on FileuploadInterceptor your application is safe.\n\nYou can find more details in  https://cwiki.apache.org/confluence/display/WW/S2-067 - [cloudwafs/s2-067-CVE-2024-53677](https://github.com/cloudwafs/s2-067-CVE-2024-53677) @@ -14753,6 +14754,7 @@ - [AvishekDhakal/CVE-2023-45866_EXPLOITS](https://github.com/AvishekDhakal/CVE-2023-45866_EXPLOITS) - [Chedrian07/CVE-2023-45866-POC](https://github.com/Chedrian07/CVE-2023-45866-POC) - [Danyw24/blueXploit](https://github.com/Danyw24/blueXploit) +- [xG3nesis/RustyInjector](https://github.com/xG3nesis/RustyInjector) ### CVE-2023-45966 (2023-10-23)