diff --git a/2012/CVE-2012-3716.json b/2012/CVE-2012-3716.json index caa9d68cf5..23d7aac6a0 100644 --- a/2012/CVE-2012-3716.json +++ b/2012/CVE-2012-3716.json @@ -13,10 +13,10 @@ "description": "use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range", "fork": false, "created_at": "2013-09-09T21:50:30Z", - "updated_at": "2024-08-12T19:12:16Z", + "updated_at": "2024-10-12T08:13:44Z", "pushed_at": "2015-01-12T19:56:04Z", - "stargazers_count": 17, - "watchers_count": 17, + "stargazers_count": 18, + "watchers_count": 18, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 17, + "watchers": 18, "score": 0, "subscribers_count": 2 } diff --git a/2018/CVE-2018-6574.json b/2018/CVE-2018-6574.json index da0278d3ef..1aa0b5fc31 100644 --- a/2018/CVE-2018-6574.json +++ b/2018/CVE-2018-6574.json @@ -1889,36 +1889,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 493163626, - "name": "pentesterlab", - "full_name": "ThaFWord\/pentesterlab", - "owner": { - "login": "ThaFWord", - "id": 77698145, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77698145?v=4", - "html_url": "https:\/\/github.com\/ThaFWord" - }, - "html_url": "https:\/\/github.com\/ThaFWord\/pentesterlab", - "description": "CVE-2018-6574: go get RCE", - "fork": false, - "created_at": "2022-05-17T08:32:20Z", - "updated_at": "2022-05-19T10:07:49Z", - "pushed_at": "2022-05-17T08:47:49Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 497029793, "name": "CVE-2018-6574", diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index acbb5976a9..63ab0f7168 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -43,10 +43,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2024-10-09T21:15:37Z", + "updated_at": "2024-10-12T07:50:11Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 4105, - "watchers_count": 4105, + "stargazers_count": 4106, + "watchers_count": 4106, "has_discussions": false, "forks_count": 1095, "allow_forking": true, @@ -75,7 +75,7 @@ ], "visibility": "public", "forks": 1095, - "watchers": 4105, + "watchers": 4106, "score": 0, "subscribers_count": 148 }, diff --git a/2019/CVE-2019-18935.json b/2019/CVE-2019-18935.json index 62556e30b1..d0ae3b9d06 100644 --- a/2019/CVE-2019-18935.json +++ b/2019/CVE-2019-18935.json @@ -43,10 +43,10 @@ "description": "RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.", "fork": false, "created_at": "2019-12-12T07:58:11Z", - "updated_at": "2024-10-11T12:57:04Z", + "updated_at": "2024-10-12T09:02:56Z", "pushed_at": "2022-04-14T18:23:38Z", - "stargazers_count": 346, - "watchers_count": 346, + "stargazers_count": 345, + "watchers_count": 345, "has_discussions": false, "forks_count": 85, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 85, - "watchers": 346, + "watchers": 345, "score": 0, "subscribers_count": 13 }, diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index ca4dc5fa3a..7d0ab6d7bf 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -1011,7 +1011,7 @@ "stargazers_count": 1297, "watchers_count": 1297, "has_discussions": false, - "forks_count": 344, + "forks_count": 343, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -1023,7 +1023,7 @@ "smbghost" ], "visibility": "public", - "forks": 344, + "forks": 343, "watchers": 1297, "score": 0, "subscribers_count": 34 diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index af916a7f43..2cad3625c5 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -170,10 +170,10 @@ "description": "Exploit for zerologon cve-2020-1472", "fork": false, "created_at": "2020-09-14T19:19:07Z", - "updated_at": "2024-10-09T14:18:57Z", + "updated_at": "2024-10-12T11:27:01Z", "pushed_at": "2020-10-15T18:31:15Z", - "stargazers_count": 628, - "watchers_count": 628, + "stargazers_count": 629, + "watchers_count": 629, "has_discussions": false, "forks_count": 146, "allow_forking": true, @@ -182,7 +182,7 @@ "topics": [], "visibility": "public", "forks": 146, - "watchers": 628, + "watchers": 629, "score": 0, "subscribers_count": 12 }, diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index e626086f12..afa22293d8 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,10 +13,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2024-10-09T21:15:37Z", + "updated_at": "2024-10-12T07:50:11Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 4105, - "watchers_count": 4105, + "stargazers_count": 4106, + "watchers_count": 4106, "has_discussions": false, "forks_count": 1095, "allow_forking": true, @@ -45,7 +45,7 @@ ], "visibility": "public", "forks": 1095, - "watchers": 4105, + "watchers": 4106, "score": 0, "subscribers_count": 148 }, diff --git a/2020/CVE-2020-15368.json b/2020/CVE-2020-15368.json index d152ef52e2..9042c823f5 100644 --- a/2020/CVE-2020-15368.json +++ b/2020/CVE-2020-15368.json @@ -48,8 +48,8 @@ "description": "CVE-2020-15368 updated", "fork": false, "created_at": "2024-08-10T23:51:38Z", - "updated_at": "2024-09-18T22:48:08Z", - "pushed_at": "2024-08-10T23:57:40Z", + "updated_at": "2024-10-12T08:25:16Z", + "pushed_at": "2024-10-12T08:25:12Z", "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, diff --git a/2020/CVE-2020-16898.json b/2020/CVE-2020-16898.json index 0157c35470..35852e7efd 100644 --- a/2020/CVE-2020-16898.json +++ b/2020/CVE-2020-16898.json @@ -62,10 +62,10 @@ "description": "A network detection package for CVE-2020-16898 (Windows TCP\/IP Remote Code Execution Vulnerability)", "fork": false, "created_at": "2020-10-14T03:25:00Z", - "updated_at": "2024-09-03T18:23:15Z", + "updated_at": "2024-10-12T10:28:29Z", "pushed_at": "2024-09-03T18:23:10Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -74,7 +74,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 8, + "watchers": 9, "score": 0, "subscribers_count": 9 }, diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index 72918dbbc2..1ef62da6d5 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -957,8 +957,8 @@ "description": "cve-2020-1938 POC, updated version", "fork": false, "created_at": "2024-10-12T01:46:15Z", - "updated_at": "2024-10-12T01:53:59Z", - "pushed_at": "2024-10-12T01:51:05Z", + "updated_at": "2024-10-12T11:25:37Z", + "pushed_at": "2024-10-12T11:25:33Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2020/CVE-2020-7661.json b/2020/CVE-2020-7661.json index 1902d3ced0..8ca3009d12 100644 --- a/2020/CVE-2020-7661.json +++ b/2020/CVE-2020-7661.json @@ -13,10 +13,10 @@ "description": "Regular expression matching for URL's. Maintained, safe, and browser-friendly version of url-regex. Resolves CVE-2020-7661 for Node.js servers.", "fork": false, "created_at": "2020-08-15T07:42:50Z", - "updated_at": "2024-09-28T12:21:17Z", + "updated_at": "2024-10-12T07:12:58Z", "pushed_at": "2024-04-16T15:11:54Z", - "stargazers_count": 79, - "watchers_count": 79, + "stargazers_count": 80, + "watchers_count": 80, "has_discussions": false, "forks_count": 14, "allow_forking": true, @@ -38,7 +38,7 @@ ], "visibility": "public", "forks": 14, - "watchers": 79, + "watchers": 80, "score": 0, "subscribers_count": 7 } diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index 7f01b55eb4..f910645c8e 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -457,10 +457,10 @@ "description": null, "fork": false, "created_at": "2021-07-02T16:44:24Z", - "updated_at": "2024-09-03T18:23:12Z", + "updated_at": "2024-10-12T10:29:08Z", "pushed_at": "2024-09-03T18:23:07Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -469,7 +469,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 8, + "watchers": 9, "score": 0, "subscribers_count": 6 }, diff --git a/2021/CVE-2021-22005.json b/2021/CVE-2021-22005.json index 93d2ff9600..f55ed1ddbd 100644 --- a/2021/CVE-2021-22005.json +++ b/2021/CVE-2021-22005.json @@ -299,36 +299,6 @@ "score": 0, "subscribers_count": 5 }, - { - "id": 444978473, - "name": "testanull-CVE-2021-22005.py", - "full_name": "timb-machine-mirrors\/testanull-CVE-2021-22005.py", - "owner": { - "login": "timb-machine-mirrors", - "id": 49810875, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49810875?v=4", - "html_url": "https:\/\/github.com\/timb-machine-mirrors" - }, - "html_url": "https:\/\/github.com\/timb-machine-mirrors\/testanull-CVE-2021-22005.py", - "description": "Clone from gist", - "fork": false, - "created_at": "2022-01-05T23:22:08Z", - "updated_at": "2023-04-08T20:15:10Z", - "pushed_at": "2022-01-05T23:22:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 - }, { "id": 505737586, "name": "cve-2021-22005", diff --git a/2021/CVE-2021-28482.json b/2021/CVE-2021-28482.json index 694175c4ba..40791a0a04 100644 --- a/2021/CVE-2021-28482.json +++ b/2021/CVE-2021-28482.json @@ -58,35 +58,5 @@ "watchers": 0, "score": 0, "subscribers_count": 1 - }, - { - "id": 444979391, - "name": "testanull-CVE-2021-28482.py", - "full_name": "timb-machine-mirrors\/testanull-CVE-2021-28482.py", - "owner": { - "login": "timb-machine-mirrors", - "id": 49810875, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49810875?v=4", - "html_url": "https:\/\/github.com\/timb-machine-mirrors" - }, - "html_url": "https:\/\/github.com\/timb-machine-mirrors\/testanull-CVE-2021-28482.py", - "description": "Clone from gist", - "fork": false, - "created_at": "2022-01-05T23:26:58Z", - "updated_at": "2023-04-08T20:15:02Z", - "pushed_at": "2022-01-05T23:27:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-36260.json b/2021/CVE-2021-36260.json index 0a4c703dae..4cbc5000b5 100644 --- a/2021/CVE-2021-36260.json +++ b/2021/CVE-2021-36260.json @@ -133,10 +133,10 @@ "description": "海康威视RCE漏洞 批量检测和利用工具", "fork": false, "created_at": "2022-08-03T17:27:59Z", - "updated_at": "2024-09-03T15:06:29Z", + "updated_at": "2024-10-12T08:14:07Z", "pushed_at": "2022-08-05T19:57:30Z", - "stargazers_count": 137, - "watchers_count": 137, + "stargazers_count": 138, + "watchers_count": 138, "has_discussions": false, "forks_count": 24, "allow_forking": true, @@ -148,7 +148,7 @@ ], "visibility": "public", "forks": 24, - "watchers": 137, + "watchers": 138, "score": 0, "subscribers_count": 2 }, diff --git a/2021/CVE-2021-40539.json b/2021/CVE-2021-40539.json index 136bc5ee63..071fe5e89c 100644 --- a/2021/CVE-2021-40539.json +++ b/2021/CVE-2021-40539.json @@ -58,5 +58,65 @@ "watchers": 46, "score": 0, "subscribers_count": 6 + }, + { + "id": 871545050, + "name": "CVE-2021-40539", + "full_name": "lpyzds\/CVE-2021-40539", + "owner": { + "login": "lpyzds", + "id": 178446553, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/178446553?v=4", + "html_url": "https:\/\/github.com\/lpyzds" + }, + "html_url": "https:\/\/github.com\/lpyzds\/CVE-2021-40539", + "description": "CVE-2021-40539:ADSelfService Plus RCE漏洞", + "fork": false, + "created_at": "2024-10-12T09:01:42Z", + "updated_at": "2024-10-12T09:06:21Z", + "pushed_at": "2024-10-12T09:06:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + }, + { + "id": 871547174, + "name": "CVE-2021-40539", + "full_name": "lpyydxs\/CVE-2021-40539", + "owner": { + "login": "lpyydxs", + "id": 184594317, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/184594317?v=4", + "html_url": "https:\/\/github.com\/lpyydxs" + }, + "html_url": "https:\/\/github.com\/lpyydxs\/CVE-2021-40539", + "description": "CVE-2021-40539:ADSelfService Plus RCE漏洞", + "fork": false, + "created_at": "2024-10-12T09:09:00Z", + "updated_at": "2024-10-12T09:15:57Z", + "pushed_at": "2024-10-12T09:15:53Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-42013.json b/2021/CVE-2021-42013.json index feeafb89a9..b66736feb6 100644 --- a/2021/CVE-2021-42013.json +++ b/2021/CVE-2021-42013.json @@ -43,10 +43,10 @@ "description": "Apache 2.4.50 Path traversal vulnerability", "fork": false, "created_at": "2021-10-08T05:44:54Z", - "updated_at": "2024-08-12T20:17:05Z", + "updated_at": "2024-10-12T09:02:56Z", "pushed_at": "2022-08-30T11:59:18Z", - "stargazers_count": 18, - "watchers_count": 18, + "stargazers_count": 17, + "watchers_count": 17, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 18, + "watchers": 17, "score": 0, "subscribers_count": 1 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 117efe470c..be096e7b73 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -907,10 +907,10 @@ "description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ", "fork": false, "created_at": "2021-12-10T23:19:28Z", - "updated_at": "2024-10-11T18:33:35Z", + "updated_at": "2024-10-12T08:05:29Z", "pushed_at": "2024-02-12T22:37:25Z", - "stargazers_count": 1797, - "watchers_count": 1797, + "stargazers_count": 1798, + "watchers_count": 1798, "has_discussions": false, "forks_count": 525, "allow_forking": true, @@ -924,7 +924,7 @@ ], "visibility": "public", "forks": 525, - "watchers": 1797, + "watchers": 1798, "score": 0, "subscribers_count": 27 }, @@ -1966,10 +1966,10 @@ "description": "A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too! TAG_OS_TOOL, OWNER_KELLY, DC_PUBLIC", "fork": false, "created_at": "2021-12-12T00:29:03Z", - "updated_at": "2024-09-27T19:44:04Z", + "updated_at": "2024-10-12T07:30:06Z", "pushed_at": "2022-03-10T18:44:50Z", - "stargazers_count": 634, - "watchers_count": 634, + "stargazers_count": 635, + "watchers_count": 635, "has_discussions": false, "forks_count": 98, "allow_forking": true, @@ -1990,7 +1990,7 @@ ], "visibility": "public", "forks": 98, - "watchers": 634, + "watchers": 635, "score": 0, "subscribers_count": 28 }, @@ -4721,10 +4721,10 @@ "description": "Log4j Exploit Detection Logic for Zeek", "fork": false, "created_at": "2021-12-13T17:25:52Z", - "updated_at": "2022-02-09T10:00:20Z", + "updated_at": "2024-10-12T10:55:49Z", "pushed_at": "2024-05-04T18:38:58Z", - "stargazers_count": 18, - "watchers_count": 18, + "stargazers_count": 19, + "watchers_count": 19, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -4736,7 +4736,7 @@ ], "visibility": "public", "forks": 8, - "watchers": 18, + "watchers": 19, "score": 0, "subscribers_count": 9 }, diff --git a/2022/CVE-2022-1329.json b/2022/CVE-2022-1329.json index a02a3be1da..e0f9477042 100644 --- a/2022/CVE-2022-1329.json +++ b/2022/CVE-2022-1329.json @@ -169,8 +169,8 @@ "description": null, "fork": false, "created_at": "2024-10-11T16:57:20Z", - "updated_at": "2024-10-11T17:13:10Z", - "pushed_at": "2024-10-11T17:13:06Z", + "updated_at": "2024-10-12T11:13:11Z", + "pushed_at": "2024-10-12T11:13:07Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-1972.json b/2022/CVE-2022-1972.json index 1700080a6b..0fcb086d55 100644 --- a/2022/CVE-2022-1972.json +++ b/2022/CVE-2022-1972.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2022-06-10T13:15:20Z", - "updated_at": "2024-08-12T20:24:01Z", + "updated_at": "2024-10-12T07:48:23Z", "pushed_at": "2022-06-13T17:00:33Z", - "stargazers_count": 19, - "watchers_count": 19, + "stargazers_count": 20, + "watchers_count": 20, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 19, + "watchers": 20, "score": 0, "subscribers_count": 5 } diff --git a/2022/CVE-2022-20452.json b/2022/CVE-2022-20452.json index 2910974b04..91d4d26b3f 100644 --- a/2022/CVE-2022-20452.json +++ b/2022/CVE-2022-20452.json @@ -13,10 +13,10 @@ "description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()", "fork": false, "created_at": "2023-01-10T16:24:51Z", - "updated_at": "2024-09-25T08:36:08Z", + "updated_at": "2024-10-12T08:35:14Z", "pushed_at": "2023-04-12T17:28:49Z", - "stargazers_count": 274, - "watchers_count": 274, + "stargazers_count": 275, + "watchers_count": 275, "has_discussions": false, "forks_count": 47, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 47, - "watchers": 274, + "watchers": 275, "score": 0, "subscribers_count": 9 } diff --git a/2022/CVE-2022-21907.json b/2022/CVE-2022-21907.json index de8a066faa..20a7e3a8fd 100644 --- a/2022/CVE-2022-21907.json +++ b/2022/CVE-2022-21907.json @@ -13,10 +13,10 @@ "description": "cve-2022-21907", "fork": false, "created_at": "2022-01-11T05:00:55Z", - "updated_at": "2022-03-21T07:03:34Z", + "updated_at": "2024-10-12T10:25:17Z", "pushed_at": "2024-10-11T14:52:28Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 6 }, diff --git a/2022/CVE-2022-22063.json b/2022/CVE-2022-22063.json index d5665e17e3..7bed3a9da8 100644 --- a/2022/CVE-2022-22063.json +++ b/2022/CVE-2022-22063.json @@ -13,12 +13,12 @@ "description": "Security issue in the hypervisor firmware of some older Qualcomm chipsets", "fork": false, "created_at": "2022-12-27T19:48:30Z", - "updated_at": "2024-10-02T14:50:40Z", + "updated_at": "2024-10-12T07:32:28Z", "pushed_at": "2022-12-27T20:32:37Z", - "stargazers_count": 20, - "watchers_count": 20, + "stargazers_count": 21, + "watchers_count": 21, "has_discussions": true, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -33,8 +33,8 @@ "security" ], "visibility": "public", - "forks": 0, - "watchers": 20, + "forks": 1, + "watchers": 21, "score": 0, "subscribers_count": 1 } diff --git a/2022/CVE-2022-26809.json b/2022/CVE-2022-26809.json index 507dd1d33a..e25d16a0aa 100644 --- a/2022/CVE-2022-26809.json +++ b/2022/CVE-2022-26809.json @@ -105,10 +105,10 @@ "description": "Detects attempts and successful exploitation of CVE-2022-26809", "fork": false, "created_at": "2022-04-14T16:58:09Z", - "updated_at": "2024-09-16T15:44:38Z", + "updated_at": "2024-10-12T10:26:20Z", "pushed_at": "2024-09-16T15:44:34Z", - "stargazers_count": 31, - "watchers_count": 31, + "stargazers_count": 32, + "watchers_count": 32, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -117,7 +117,7 @@ "topics": [], "visibility": "public", "forks": 15, - "watchers": 31, + "watchers": 32, "score": 0, "subscribers_count": 10 }, diff --git a/2022/CVE-2022-29581.json b/2022/CVE-2022-29581.json index 9efc208a75..f80d8c1803 100644 --- a/2022/CVE-2022-29581.json +++ b/2022/CVE-2022-29581.json @@ -44,7 +44,7 @@ "fork": false, "created_at": "2022-12-23T12:33:21Z", "updated_at": "2023-03-10T01:15:25Z", - "pushed_at": "2024-10-11T02:37:08Z", + "pushed_at": "2024-10-12T11:29:34Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-34918.json b/2022/CVE-2022-34918.json index df9a2ba5ac..dd239daaae 100644 --- a/2022/CVE-2022-34918.json +++ b/2022/CVE-2022-34918.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2022-07-19T12:46:45Z", - "updated_at": "2024-10-08T11:35:22Z", + "updated_at": "2024-10-12T07:48:20Z", "pushed_at": "2022-09-06T14:05:22Z", - "stargazers_count": 243, - "watchers_count": 243, + "stargazers_count": 244, + "watchers_count": 244, "has_discussions": false, "forks_count": 35, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 35, - "watchers": 243, + "watchers": 244, "score": 0, "subscribers_count": 12 }, diff --git a/2022/CVE-2022-39197.json b/2022/CVE-2022-39197.json index f87a2bbf26..7fca845c7c 100644 --- a/2022/CVE-2022-39197.json +++ b/2022/CVE-2022-39197.json @@ -108,13 +108,13 @@ "stargazers_count": 48, "watchers_count": 48, "has_discussions": false, - "forks_count": 14, + "forks_count": 13, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 14, + "forks": 13, "watchers": 48, "score": 0, "subscribers_count": 2 diff --git a/2023/CVE-2023-27566.json b/2023/CVE-2023-27566.json index fb05e3d5ba..ac8058f53a 100644 --- a/2023/CVE-2023-27566.json +++ b/2023/CVE-2023-27566.json @@ -13,10 +13,10 @@ "description": "MOC3ingbird Exploit for Live2D (CVE-2023-27566)", "fork": false, "created_at": "2023-03-03T01:57:28Z", - "updated_at": "2024-09-28T03:10:19Z", + "updated_at": "2024-10-12T07:47:08Z", "pushed_at": "2023-09-19T01:12:41Z", - "stargazers_count": 77, - "watchers_count": 77, + "stargazers_count": 78, + "watchers_count": 78, "has_discussions": true, "forks_count": 6, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 6, - "watchers": 77, + "watchers": 78, "score": 0, "subscribers_count": 2 } diff --git a/2023/CVE-2023-3824.json b/2023/CVE-2023-3824.json index a68be08529..0f75daa1b8 100644 --- a/2023/CVE-2023-3824.json +++ b/2023/CVE-2023-3824.json @@ -73,10 +73,10 @@ "description": "CVE-2023-3824 PoC", "fork": false, "created_at": "2024-10-11T10:53:04Z", - "updated_at": "2024-10-11T15:14:00Z", + "updated_at": "2024-10-12T12:12:20Z", "pushed_at": "2024-10-11T10:59:49Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -95,7 +95,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-21413.json b/2024/CVE-2024-21413.json index 7bf75b4254..43694c03f0 100644 --- a/2024/CVE-2024-21413.json +++ b/2024/CVE-2024-21413.json @@ -193,10 +193,10 @@ "description": "Bu betik, Microsoft Outlook'ta keşfedilen ve CVSS değeri 9.8 olan önemli bir güvenlik açığı olan CVE-2024-21413 için bir kavram kanıtı (PoC) sunmaktadır. MonikerLink hatası olarak adlandırılan bu güvenlik açığı, yerel NTLM bilgilerinin potansiyel sızıntısı ve uzaktan kod çalıştırma olasılığı dahil olmak üzere geniş kapsamlı etkilere sahiptir.", "fork": false, "created_at": "2024-02-23T12:13:11Z", - "updated_at": "2024-04-02T15:01:16Z", + "updated_at": "2024-10-12T07:56:40Z", "pushed_at": "2024-02-24T15:36:22Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -205,7 +205,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-23897.json b/2024/CVE-2024-23897.json index 3b3e15f1a1..ec1bf8583e 100644 --- a/2024/CVE-2024-23897.json +++ b/2024/CVE-2024-23897.json @@ -73,10 +73,10 @@ "description": "CVE-2024-23897", "fork": false, "created_at": "2024-01-26T09:44:32Z", - "updated_at": "2024-09-23T03:28:47Z", + "updated_at": "2024-10-12T07:59:45Z", "pushed_at": "2024-01-28T06:47:28Z", - "stargazers_count": 190, - "watchers_count": 190, + "stargazers_count": 191, + "watchers_count": 191, "has_discussions": false, "forks_count": 36, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 36, - "watchers": 190, + "watchers": 191, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-3094.json b/2024/CVE-2024-3094.json index d3ccc6e2e3..1b261b7219 100644 --- a/2024/CVE-2024-3094.json +++ b/2024/CVE-2024-3094.json @@ -982,10 +982,10 @@ "description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)", "fork": false, "created_at": "2024-04-01T14:28:09Z", - "updated_at": "2024-10-11T08:19:38Z", + "updated_at": "2024-10-12T11:52:12Z", "pushed_at": "2024-04-03T04:58:50Z", - "stargazers_count": 3491, - "watchers_count": 3491, + "stargazers_count": 3492, + "watchers_count": 3492, "has_discussions": false, "forks_count": 239, "allow_forking": true, @@ -994,7 +994,7 @@ "topics": [], "visibility": "public", "forks": 239, - "watchers": 3491, + "watchers": 3492, "score": 0, "subscribers_count": 38 }, diff --git a/2024/CVE-2024-3656.json b/2024/CVE-2024-3656.json new file mode 100644 index 0000000000..1800650c7f --- /dev/null +++ b/2024/CVE-2024-3656.json @@ -0,0 +1,32 @@ +[ + { + "id": 871549647, + "name": "CVE-2024-3656", + "full_name": "h4x0r-dz\/CVE-2024-3656", + "owner": { + "login": "h4x0r-dz", + "id": 26070859, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26070859?v=4", + "html_url": "https:\/\/github.com\/h4x0r-dz" + }, + "html_url": "https:\/\/github.com\/h4x0r-dz\/CVE-2024-3656", + "description": "Keycloak admin API allows low privilege users to use administrative functions", + "fork": false, + "created_at": "2024-10-12T09:17:00Z", + "updated_at": "2024-10-12T12:04:30Z", + "pushed_at": "2024-10-12T09:48:10Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 1, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-38200.json b/2024/CVE-2024-38200.json index 0b73417feb..b76b4045c2 100644 --- a/2024/CVE-2024-38200.json +++ b/2024/CVE-2024-38200.json @@ -13,10 +13,10 @@ "description": "CVE-2024-38200 - Microsoft Office NTLMv2 Disclosure Vulnerability ", "fork": false, "created_at": "2024-09-24T19:24:55Z", - "updated_at": "2024-10-10T14:59:31Z", + "updated_at": "2024-10-12T08:14:19Z", "pushed_at": "2024-10-01T15:38:24Z", - "stargazers_count": 115, - "watchers_count": 115, + "stargazers_count": 116, + "watchers_count": 116, "has_discussions": false, "forks_count": 25, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 25, - "watchers": 115, + "watchers": 116, "score": 0, "subscribers_count": 2 } diff --git a/2024/CVE-2024-38816.json b/2024/CVE-2024-38816.json index be15ff9738..782e914362 100644 --- a/2024/CVE-2024-38816.json +++ b/2024/CVE-2024-38816.json @@ -43,10 +43,10 @@ "description": "CVE-2024-38816 Proof of Concept", "fork": false, "created_at": "2024-09-28T23:16:23Z", - "updated_at": "2024-09-28T23:16:23Z", + "updated_at": "2024-10-12T08:27:06Z", "pushed_at": "2024-09-26T09:46:19Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-42640.json b/2024/CVE-2024-42640.json index 310e77b717..e1d4296ec0 100644 --- a/2024/CVE-2024-42640.json +++ b/2024/CVE-2024-42640.json @@ -13,12 +13,12 @@ "description": "Unauthenticated Remote Code Execution via Angular-Base64-Upload Library ", "fork": false, "created_at": "2024-10-09T14:35:06Z", - "updated_at": "2024-10-11T18:41:59Z", + "updated_at": "2024-10-12T10:22:25Z", "pushed_at": "2024-10-11T16:31:01Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, - "forks_count": 2, + "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -29,8 +29,8 @@ "poc-exploit" ], "visibility": "public", - "forks": 2, - "watchers": 2, + "forks": 3, + "watchers": 3, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-45519.json b/2024/CVE-2024-45519.json index bd9e9a2ff1..244d18d0a1 100644 --- a/2024/CVE-2024-45519.json +++ b/2024/CVE-2024-45519.json @@ -73,19 +73,19 @@ "description": "Zimbra - Remote Command Execution (CVE-2024-45519)", "fork": false, "created_at": "2024-10-05T00:15:18Z", - "updated_at": "2024-10-11T11:18:58Z", + "updated_at": "2024-10-12T09:23:17Z", "pushed_at": "2024-10-05T00:18:49Z", - "stargazers_count": 88, - "watchers_count": 88, + "stargazers_count": 89, + "watchers_count": 89, "has_discussions": false, - "forks_count": 15, + "forks_count": 16, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 15, - "watchers": 88, + "forks": 16, + "watchers": 89, "score": 0, "subscribers_count": 3 } diff --git a/2024/CVE-2024-7029.json b/2024/CVE-2024-7029.json index cd9e1686ca..04d6595e60 100644 --- a/2024/CVE-2024-7029.json +++ b/2024/CVE-2024-7029.json @@ -82,10 +82,10 @@ "description": " A PoC exploit for the CVE-2024-7029 vulnerability found in AvTech devices, allowing Remote Code Execution (RCE)", "fork": false, "created_at": "2024-10-08T10:04:08Z", - "updated_at": "2024-10-11T16:47:25Z", + "updated_at": "2024-10-12T09:07:03Z", "pushed_at": "2024-10-08T10:08:07Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -94,7 +94,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 2 } diff --git a/2024/CVE-2024-8353.json b/2024/CVE-2024-8353.json index bb4ce433ec..6ce6f8d0e4 100644 --- a/2024/CVE-2024-8353.json +++ b/2024/CVE-2024-8353.json @@ -13,10 +13,10 @@ "description": "Proof-of-Concept for CVE-2024-8353", "fork": false, "created_at": "2024-09-30T17:33:59Z", - "updated_at": "2024-10-08T02:39:22Z", + "updated_at": "2024-10-12T07:06:23Z", "pushed_at": "2024-10-01T00:04:52Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -33,7 +33,7 @@ ], "visibility": "public", "forks": 2, - "watchers": 5, + "watchers": 6, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-9464.json b/2024/CVE-2024-9464.json index 75e7ef2296..4b67bd57c3 100644 --- a/2024/CVE-2024-9464.json +++ b/2024/CVE-2024-9464.json @@ -13,10 +13,10 @@ "description": "Proof of Concept Exploit for CVE-2024-9464", "fork": false, "created_at": "2024-10-09T16:36:25Z", - "updated_at": "2024-10-11T23:21:10Z", + "updated_at": "2024-10-12T09:36:31Z", "pushed_at": "2024-10-09T16:41:41Z", - "stargazers_count": 22, - "watchers_count": 22, + "stargazers_count": 24, + "watchers_count": 24, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 22, + "watchers": 24, "score": 0, "subscribers_count": 4 }, diff --git a/2024/CVE-2024-9570.json b/2024/CVE-2024-9570.json index 1ea6f40ccb..9183293094 100644 --- a/2024/CVE-2024-9570.json +++ b/2024/CVE-2024-9570.json @@ -18,13 +18,13 @@ "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 diff --git a/README.md b/README.md index 8ec03273bc..6bfb5479fc 100644 --- a/README.md +++ b/README.md @@ -774,6 +774,9 @@ - [alperenugurlu/CVE-2024-3596-Detector](https://github.com/alperenugurlu/CVE-2024-3596-Detector) +### CVE-2024-3656 +- [h4x0r-dz/CVE-2024-3656](https://github.com/h4x0r-dz/CVE-2024-3656) + ### CVE-2024-3806 (2024-05-09) The Porto theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 7.1.0 via the 'porto_ajax_posts' function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where php file type can be uploaded and included. @@ -22092,7 +22095,6 @@ - [tiagob0b/CVE-2021-22005](https://github.com/tiagob0b/CVE-2021-22005) - [Jun-5heng/CVE-2021-22005](https://github.com/Jun-5heng/CVE-2021-22005) - [shmilylty/cve-2021-22005-exp](https://github.com/shmilylty/cve-2021-22005-exp) -- [timb-machine-mirrors/testanull-CVE-2021-22005.py](https://github.com/timb-machine-mirrors/testanull-CVE-2021-22005.py) - [InventorMAO/cve-2021-22005](https://github.com/InventorMAO/cve-2021-22005) ### CVE-2021-22006 (2021-09-23) @@ -23206,7 +23208,6 @@ - [Shadow0ps/CVE-2021-28482-Exchange-POC](https://github.com/Shadow0ps/CVE-2021-28482-Exchange-POC) - [KevinWorst/CVE-2021-28482_Exploit](https://github.com/KevinWorst/CVE-2021-28482_Exploit) -- [timb-machine-mirrors/testanull-CVE-2021-28482.py](https://github.com/timb-machine-mirrors/testanull-CVE-2021-28482.py) ### CVE-2021-28663 (2021-05-10) @@ -24976,6 +24977,8 @@ - [DarkSprings/CVE-2021-40539](https://github.com/DarkSprings/CVE-2021-40539) - [synacktiv/CVE-2021-40539](https://github.com/synacktiv/CVE-2021-40539) +- [lpyzds/CVE-2021-40539](https://github.com/lpyzds/CVE-2021-40539) +- [lpyydxs/CVE-2021-40539](https://github.com/lpyydxs/CVE-2021-40539) ### CVE-2021-40822 (2022-05-01) @@ -37377,7 +37380,6 @@ - [twseptian/cve-2018-6574](https://github.com/twseptian/cve-2018-6574) - [the-valluvarsploit/CVE-2018-6574](https://github.com/the-valluvarsploit/CVE-2018-6574) - [yavolo/CVE-2018-6574](https://github.com/yavolo/CVE-2018-6574) -- [ThaFWord/pentesterlab](https://github.com/ThaFWord/pentesterlab) - [jftierno/CVE-2018-6574](https://github.com/jftierno/CVE-2018-6574) - [Cypheer/exploit_CVE-2018-6574](https://github.com/Cypheer/exploit_CVE-2018-6574) - [jftierno/CVE-2018-6574-2](https://github.com/jftierno/CVE-2018-6574-2)