From e5466a4328b6f98c852c44433511a9038b16fded Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Mon, 9 Dec 2024 03:31:26 +0900 Subject: [PATCH] Auto Update 2024/12/08 18:31:26 --- 2009/CVE-2009-0689.json | 8 ++++---- 2017/CVE-2017-20165.json | 4 ++-- 2017/CVE-2017-5638.json | 31 +++++++++++++++++++++++++++++++ 2017/CVE-2017-7921.json | 8 ++++---- 2020/CVE-2020-0796.json | 8 ++++---- 2020/CVE-2020-1472.json | 8 ++++---- 2020/CVE-2020-5752.json | 8 ++++---- 2021/CVE-2021-30955.json | 4 ++-- 2021/CVE-2021-34527.json | 8 ++++---- 2021/CVE-2021-43798.json | 8 ++++---- 2022/CVE-2022-0543.json | 8 ++++---- 2022/CVE-2022-3699.json | 8 ++++---- 2023/CVE-2023-30253.json | 4 ++-- 2023/CVE-2023-44976.json | 4 ++-- 2024/CVE-2024-10914.json | 8 ++++---- 2024/CVE-2024-25641.json | 8 ++++---- 2024/CVE-2024-27198.json | 8 ++++---- 2024/CVE-2024-49039.json | 8 ++++---- 2024/CVE-2024-6387.json | 24 ++++++++++++------------ README.md | 1 + 20 files changed, 104 insertions(+), 72 deletions(-) diff --git a/2009/CVE-2009-0689.json b/2009/CVE-2009-0689.json index b00cd348f4..0bf4d75aad 100644 --- a/2009/CVE-2009-0689.json +++ b/2009/CVE-2009-0689.json @@ -14,10 +14,10 @@ "description": "An implementation of CVE-2009-0689 for the Nintendo Wii.", "fork": false, "created_at": "2018-12-18T04:24:43Z", - "updated_at": "2024-10-10T06:13:29Z", + "updated_at": "2024-12-08T13:18:23Z", "pushed_at": "2019-09-30T23:38:11Z", - "stargazers_count": 73, - "watchers_count": 73, + "stargazers_count": 74, + "watchers_count": 74, "has_discussions": false, "forks_count": 14, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 14, - "watchers": 73, + "watchers": 74, "score": 0, "subscribers_count": 7 } diff --git a/2017/CVE-2017-20165.json b/2017/CVE-2017-20165.json index 5411faaf2a..fa15912343 100644 --- a/2017/CVE-2017-20165.json +++ b/2017/CVE-2017-20165.json @@ -14,8 +14,8 @@ "description": "Fork of the send module to deal with CVE-2017-20165", "fork": false, "created_at": "2023-01-11T10:20:27Z", - "updated_at": "2024-12-05T14:23:33Z", - "pushed_at": "2024-12-08T10:54:53Z", + "updated_at": "2024-12-08T16:16:44Z", + "pushed_at": "2024-12-08T16:16:43Z", "stargazers_count": 13, "watchers_count": 13, "has_discussions": false, diff --git a/2017/CVE-2017-5638.json b/2017/CVE-2017-5638.json index ba575e85e5..d97dfebb63 100644 --- a/2017/CVE-2017-5638.json +++ b/2017/CVE-2017-5638.json @@ -2222,5 +2222,36 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 900400961, + "name": "CVE-2017-5638-POC", + "full_name": "Xernary\/CVE-2017-5638-POC", + "owner": { + "login": "Xernary", + "id": 75204222, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75204222?v=4", + "html_url": "https:\/\/github.com\/Xernary", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Xernary\/CVE-2017-5638-POC", + "description": "Proof of concept of CVE-2017-5638 including the whole setup of the Apache vulnerable server", + "fork": false, + "created_at": "2024-12-08T17:22:38Z", + "updated_at": "2024-12-08T17:38:27Z", + "pushed_at": "2024-12-08T17:38:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-7921.json b/2017/CVE-2017-7921.json index 08073e0bd8..318b59f8c2 100644 --- a/2017/CVE-2017-7921.json +++ b/2017/CVE-2017-7921.json @@ -107,10 +107,10 @@ "description": "This python file will decrypt the configurationFile used by hikvision cameras vulnerable to CVE-2017-7921.", "fork": false, "created_at": "2021-01-29T16:08:35Z", - "updated_at": "2024-12-01T09:54:11Z", + "updated_at": "2024-12-08T16:46:27Z", "pushed_at": "2021-01-29T16:22:39Z", - "stargazers_count": 98, - "watchers_count": 98, + "stargazers_count": 99, + "watchers_count": 99, "has_discussions": false, "forks_count": 26, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 26, - "watchers": 98, + "watchers": 99, "score": 0, "subscribers_count": 3 }, diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 7cf38b96ed..12083b377f 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -138,10 +138,10 @@ "description": "Scanner for CVE-2020-0796 - SMBv3 RCE", "fork": false, "created_at": "2020-03-11T15:21:27Z", - "updated_at": "2024-12-04T07:18:39Z", + "updated_at": "2024-12-08T17:23:05Z", "pushed_at": "2020-10-01T08:36:29Z", - "stargazers_count": 667, - "watchers_count": 667, + "stargazers_count": 668, + "watchers_count": 668, "has_discussions": false, "forks_count": 197, "allow_forking": true, @@ -152,7 +152,7 @@ ], "visibility": "public", "forks": 197, - "watchers": 667, + "watchers": 668, "score": 0, "subscribers_count": 26 }, diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index aadda3595b..c6af87dc3d 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -176,10 +176,10 @@ "description": "Exploit for zerologon cve-2020-1472", "fork": false, "created_at": "2020-09-14T19:19:07Z", - "updated_at": "2024-12-02T15:02:12Z", + "updated_at": "2024-12-08T14:49:17Z", "pushed_at": "2020-10-15T18:31:15Z", - "stargazers_count": 635, - "watchers_count": 635, + "stargazers_count": 636, + "watchers_count": 636, "has_discussions": false, "forks_count": 146, "allow_forking": true, @@ -188,7 +188,7 @@ "topics": [], "visibility": "public", "forks": 146, - "watchers": 635, + "watchers": 636, "score": 0, "subscribers_count": 12 }, diff --git a/2020/CVE-2020-5752.json b/2020/CVE-2020-5752.json index 2c5e55a875..243ffbb631 100644 --- a/2020/CVE-2020-5752.json +++ b/2020/CVE-2020-5752.json @@ -14,10 +14,10 @@ "description": "Druva inSync Windows Client 6.6.3 - Local Privilege Escalation (PowerShell) RCE", "fork": false, "created_at": "2021-11-21T08:30:24Z", - "updated_at": "2022-12-03T11:45:49Z", + "updated_at": "2024-12-08T17:26:37Z", "pushed_at": "2022-12-03T11:45:32Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2021/CVE-2021-30955.json b/2021/CVE-2021-30955.json index b56a751f63..922961f5ca 100644 --- a/2021/CVE-2021-30955.json +++ b/2021/CVE-2021-30955.json @@ -112,13 +112,13 @@ "stargazers_count": 253, "watchers_count": 253, "has_discussions": false, - "forks_count": 43, + "forks_count": 42, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 43, + "forks": 42, "watchers": 253, "score": 0, "subscribers_count": 8 diff --git a/2021/CVE-2021-34527.json b/2021/CVE-2021-34527.json index 3cfd114b7b..469cd7ba40 100644 --- a/2021/CVE-2021-34527.json +++ b/2021/CVE-2021-34527.json @@ -113,10 +113,10 @@ "description": "PrintNightmare - Windows Print Spooler RCE\/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits", "fork": false, "created_at": "2021-07-03T15:15:12Z", - "updated_at": "2024-12-07T20:17:00Z", + "updated_at": "2024-12-08T14:49:18Z", "pushed_at": "2021-09-13T12:12:17Z", - "stargazers_count": 125, - "watchers_count": 125, + "stargazers_count": 127, + "watchers_count": 127, "has_discussions": false, "forks_count": 39, "allow_forking": true, @@ -132,7 +132,7 @@ ], "visibility": "public", "forks": 39, - "watchers": 125, + "watchers": 127, "score": 0, "subscribers_count": 7 }, diff --git a/2021/CVE-2021-43798.json b/2021/CVE-2021-43798.json index 3293d260ec..3201846e4b 100644 --- a/2021/CVE-2021-43798.json +++ b/2021/CVE-2021-43798.json @@ -14,10 +14,10 @@ "description": "CVE-2021-43798 - Grafana 8.x Path Traversal (Pre-Auth)", "fork": false, "created_at": "2021-12-06T20:10:23Z", - "updated_at": "2024-11-18T19:09:55Z", + "updated_at": "2024-12-08T17:21:47Z", "pushed_at": "2021-12-07T18:09:20Z", - "stargazers_count": 34, - "watchers_count": 34, + "stargazers_count": 35, + "watchers_count": 35, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 34, + "watchers": 35, "score": 0, "subscribers_count": 2 }, diff --git a/2022/CVE-2022-0543.json b/2022/CVE-2022-0543.json index 2ff4d85e4b..5030423f4d 100644 --- a/2022/CVE-2022-0543.json +++ b/2022/CVE-2022-0543.json @@ -107,10 +107,10 @@ "description": "redis未授权、redis_CVE-2022-0543检测利用二合一脚本", "fork": false, "created_at": "2023-05-10T05:05:31Z", - "updated_at": "2023-05-23T14:22:20Z", + "updated_at": "2024-12-08T15:52:10Z", "pushed_at": "2023-05-11T09:23:28Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 } diff --git a/2022/CVE-2022-3699.json b/2022/CVE-2022-3699.json index 03091495d7..cdf949cf28 100644 --- a/2022/CVE-2022-3699.json +++ b/2022/CVE-2022-3699.json @@ -14,10 +14,10 @@ "description": "Lenovo Diagnostics Driver EoP - Arbitrary R\/W", "fork": false, "created_at": "2022-11-09T14:15:30Z", - "updated_at": "2024-10-05T16:20:05Z", + "updated_at": "2024-12-08T17:04:10Z", "pushed_at": "2022-12-05T23:36:42Z", - "stargazers_count": 169, - "watchers_count": 169, + "stargazers_count": 170, + "watchers_count": 170, "has_discussions": false, "forks_count": 47, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 47, - "watchers": 169, + "watchers": 170, "score": 0, "subscribers_count": 5 }, diff --git a/2023/CVE-2023-30253.json b/2023/CVE-2023-30253.json index fa73f415be..64911de83f 100644 --- a/2023/CVE-2023-30253.json +++ b/2023/CVE-2023-30253.json @@ -81,13 +81,13 @@ "stargazers_count": 37, "watchers_count": 37, "has_discussions": false, - "forks_count": 4, + "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 4, + "forks": 5, "watchers": 37, "score": 0, "subscribers_count": 1 diff --git a/2023/CVE-2023-44976.json b/2023/CVE-2023-44976.json index fde42c005c..8826eeda97 100644 --- a/2023/CVE-2023-44976.json +++ b/2023/CVE-2023-44976.json @@ -19,13 +19,13 @@ "stargazers_count": 89, "watchers_count": 89, "has_discussions": false, - "forks_count": 18, + "forks_count": 19, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 18, + "forks": 19, "watchers": 89, "score": 0, "subscribers_count": 2 diff --git a/2024/CVE-2024-10914.json b/2024/CVE-2024-10914.json index b384162abd..08383df30d 100644 --- a/2024/CVE-2024-10914.json +++ b/2024/CVE-2024-10914.json @@ -277,10 +277,10 @@ "description": "CVE-2024-10914 D-Link Remote Code Execution (RCE)", "fork": false, "created_at": "2024-12-06T19:03:34Z", - "updated_at": "2024-12-07T07:32:33Z", + "updated_at": "2024-12-08T16:46:28Z", "pushed_at": "2024-12-07T07:32:30Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -293,7 +293,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-25641.json b/2024/CVE-2024-25641.json index 7928d6f350..008aca46d4 100644 --- a/2024/CVE-2024-25641.json +++ b/2024/CVE-2024-25641.json @@ -124,10 +124,10 @@ "description": "Fully automated PoC - CVE-2024-25641 - RCE - Cacti < v1.2.26 🌵", "fork": false, "created_at": "2024-08-29T06:27:25Z", - "updated_at": "2024-10-26T23:01:48Z", + "updated_at": "2024-12-08T16:09:09Z", "pushed_at": "2024-09-03T05:21:04Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -136,7 +136,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 6, + "watchers": 7, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-27198.json b/2024/CVE-2024-27198.json index 30781fa04b..db9d409408 100644 --- a/2024/CVE-2024-27198.json +++ b/2024/CVE-2024-27198.json @@ -79,10 +79,10 @@ "description": "CVE-2024-27198 & CVE-2024-27199 Authentication Bypass --> RCE in JetBrains TeamCity Pre-2023.11.4", "fork": false, "created_at": "2024-03-06T03:15:03Z", - "updated_at": "2024-11-26T22:50:05Z", + "updated_at": "2024-12-08T12:52:01Z", "pushed_at": "2024-03-11T07:57:40Z", - "stargazers_count": 144, - "watchers_count": 144, + "stargazers_count": 145, + "watchers_count": 145, "has_discussions": false, "forks_count": 36, "allow_forking": true, @@ -101,7 +101,7 @@ ], "visibility": "public", "forks": 36, - "watchers": 144, + "watchers": 145, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-49039.json b/2024/CVE-2024-49039.json index 301146b1d0..d00dca5724 100644 --- a/2024/CVE-2024-49039.json +++ b/2024/CVE-2024-49039.json @@ -14,10 +14,10 @@ "description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler", "fork": false, "created_at": "2024-11-19T08:57:18Z", - "updated_at": "2024-12-08T06:06:36Z", + "updated_at": "2024-12-08T14:49:52Z", "pushed_at": "2024-11-19T09:15:26Z", - "stargazers_count": 79, - "watchers_count": 79, + "stargazers_count": 81, + "watchers_count": 81, "has_discussions": false, "forks_count": 18, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 18, - "watchers": 79, + "watchers": 81, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-6387.json b/2024/CVE-2024-6387.json index 2bf5e1d224..a639bcc584 100644 --- a/2024/CVE-2024-6387.json +++ b/2024/CVE-2024-6387.json @@ -14,10 +14,10 @@ "description": "a signal handler race condition in OpenSSH's server (sshd)", "fork": false, "created_at": "2024-07-01T10:55:29Z", - "updated_at": "2024-11-28T00:20:21Z", + "updated_at": "2024-12-08T12:43:11Z", "pushed_at": "2024-07-01T10:54:02Z", - "stargazers_count": 465, - "watchers_count": 465, + "stargazers_count": 466, + "watchers_count": 466, "has_discussions": false, "forks_count": 181, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 181, - "watchers": 465, + "watchers": 466, "score": 0, "subscribers_count": 5 }, @@ -145,10 +145,10 @@ "description": "PoC RCE in OpenSSH", "fork": false, "created_at": "2024-07-01T12:51:18Z", - "updated_at": "2024-12-06T09:40:42Z", + "updated_at": "2024-12-08T12:41:06Z", "pushed_at": "2024-07-01T13:34:47Z", - "stargazers_count": 21, - "watchers_count": 21, + "stargazers_count": 22, + "watchers_count": 22, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -157,7 +157,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 21, + "watchers": 22, "score": 0, "subscribers_count": 1 }, @@ -374,10 +374,10 @@ "description": "SSH RCE PoC CVE-2024-6387", "fork": false, "created_at": "2024-07-02T01:08:05Z", - "updated_at": "2024-09-03T10:27:28Z", + "updated_at": "2024-12-08T12:40:56Z", "pushed_at": "2024-07-02T01:13:22Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -386,7 +386,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 2 }, diff --git a/README.md b/README.md index 8979fbf7ce..4967d2744c 100644 --- a/README.md +++ b/README.md @@ -42766,6 +42766,7 @@ - [FredBrave/CVE-2017-5638-ApacheStruts2.3.5](https://github.com/FredBrave/CVE-2017-5638-ApacheStruts2.3.5) - [Nithylesh/web-application-firewall-](https://github.com/Nithylesh/web-application-firewall-) - [kloutkake/CVE-2017-5638-PoC](https://github.com/kloutkake/CVE-2017-5638-PoC) +- [Xernary/CVE-2017-5638-POC](https://github.com/Xernary/CVE-2017-5638-POC) ### CVE-2017-5645 (2017-04-17)