diff --git a/2000/CVE-2000-0114.json b/2000/CVE-2000-0114.json
new file mode 100644
index 0000000000..5f01d9a439
--- /dev/null
+++ b/2000/CVE-2000-0114.json
@@ -0,0 +1,43 @@
+[
+ {
+ "id": 808060718,
+ "name": "CVE-2000-0114",
+ "full_name": "Cappricio-Securities\/CVE-2000-0114",
+ "owner": {
+ "login": "Cappricio-Securities",
+ "id": 102907425,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102907425?v=4",
+ "html_url": "https:\/\/github.com\/Cappricio-Securities"
+ },
+ "html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2000-0114",
+ "description": "Microsoft FrontPage Extensions Check (shtml.dll)",
+ "fork": false,
+ "created_at": "2024-05-30T09:55:41Z",
+ "updated_at": "2024-05-30T10:01:41Z",
+ "pushed_at": "2024-05-30T09:56:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "bugbounty",
+ "bugbounty-tool",
+ "bugbounty-tools",
+ "cve-2000-0114",
+ "cve-2000-0114-exploit",
+ "cve-2000-0114-poc",
+ "cve-2000-0114-scanner",
+ "cve-2000-0114-tool",
+ "microsoft-frontpage-extensions-check",
+ "shtml-dll"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2008/CVE-2008-7220.json b/2008/CVE-2008-7220.json
index 32c84adbd9..8a059376a0 100644
--- a/2008/CVE-2008-7220.json
+++ b/2008/CVE-2008-7220.json
@@ -18,13 +18,13 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
+ "forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 2
diff --git a/2014/CVE-2014-3566.json b/2014/CVE-2014-3566.json
index e6d0f560eb..d4d0db28b9 100644
--- a/2014/CVE-2014-3566.json
+++ b/2014/CVE-2014-3566.json
@@ -112,7 +112,7 @@
"stargazers_count": 243,
"watchers_count": 243,
"has_discussions": false,
- "forks_count": 73,
+ "forks_count": 74,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -126,7 +126,7 @@
"sslv3"
],
"visibility": "public",
- "forks": 73,
+ "forks": 74,
"watchers": 243,
"score": 0,
"subscribers_count": 17
diff --git a/2019/CVE-2019-15126.json b/2019/CVE-2019-15126.json
index fd1ac92350..c8854cdd8e 100644
--- a/2019/CVE-2019-15126.json
+++ b/2019/CVE-2019-15126.json
@@ -43,10 +43,10 @@
"description": "PoC exploit for the CVE-2019-15126 kr00k vulnerability",
"fork": false,
"created_at": "2020-03-13T14:53:54Z",
- "updated_at": "2024-04-16T23:32:20Z",
+ "updated_at": "2024-05-30T06:49:43Z",
"pushed_at": "2020-03-22T19:46:04Z",
- "stargazers_count": 213,
- "watchers_count": 213,
+ "stargazers_count": 214,
+ "watchers_count": 214,
"has_discussions": false,
"forks_count": 62,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 62,
- "watchers": 213,
+ "watchers": 214,
"score": 0,
"subscribers_count": 16
},
diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json
index f309eb4970..fe36d637f3 100644
--- a/2020/CVE-2020-1472.json
+++ b/2020/CVE-2020-1472.json
@@ -1856,14 +1856,14 @@
{
"id": 678208074,
"name": "ZeroLogon-to-Shell",
- "full_name": "botfather0x0\/ZeroLogon-to-Shell",
+ "full_name": "c3rrberu5\/ZeroLogon-to-Shell",
"owner": {
- "login": "botfather0x0",
+ "login": "c3rrberu5",
"id": 109983457,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109983457?v=4",
- "html_url": "https:\/\/github.com\/botfather0x0"
+ "html_url": "https:\/\/github.com\/c3rrberu5"
},
- "html_url": "https:\/\/github.com\/botfather0x0\/ZeroLogon-to-Shell",
+ "html_url": "https:\/\/github.com\/c3rrberu5\/ZeroLogon-to-Shell",
"description": "This is a combination of the zerologon_tester.py code (https:\/\/raw.githubusercontent.com\/SecuraBV\/CVE-2020-1472\/master\/zerologon_tester.py) and the tool evil-winrm to get a shell.",
"fork": false,
"created_at": "2023-08-14T02:40:18Z",
diff --git a/2020/CVE-2020-3452.json b/2020/CVE-2020-3452.json
index 4da8168ea3..90bacf6c5a 100644
--- a/2020/CVE-2020-3452.json
+++ b/2020/CVE-2020-3452.json
@@ -668,8 +668,8 @@
"description": "Cisco Adaptive Security Appliance (ASA)\/Firepower Threat Defense (FTD) - Local File Inclusion",
"fork": false,
"created_at": "2024-05-25T08:11:31Z",
- "updated_at": "2024-05-29T06:26:43Z",
- "pushed_at": "2024-05-29T06:26:40Z",
+ "updated_at": "2024-05-30T10:07:40Z",
+ "pushed_at": "2024-05-30T10:07:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@@ -677,7 +677,19 @@
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
- "topics": [],
+ "topics": [
+ "bugbounty",
+ "bugbounty-tool",
+ "bugbounty-tools",
+ "cisco",
+ "cisco-adaptive",
+ "cve",
+ "cve-2020-3452",
+ "cve-2020-3452-exploit",
+ "cve-2020-3452-poc",
+ "cve-2020-3452-scanner",
+ "lfi"
+ ],
"visibility": "public",
"forks": 0,
"watchers": 0,
diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json
index 8632da9acf..8604a1048a 100644
--- a/2021/CVE-2021-21972.json
+++ b/2021/CVE-2021-21972.json
@@ -851,10 +851,10 @@
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
- "updated_at": "2024-05-30T05:33:40Z",
+ "updated_at": "2024-05-30T08:52:19Z",
"pushed_at": "2024-04-25T06:09:38Z",
- "stargazers_count": 1261,
- "watchers_count": 1261,
+ "stargazers_count": 1263,
+ "watchers_count": 1263,
"has_discussions": false,
"forks_count": 160,
"allow_forking": true,
@@ -870,7 +870,7 @@
],
"visibility": "public",
"forks": 160,
- "watchers": 1261,
+ "watchers": 1263,
"score": 0,
"subscribers_count": 14
}
diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json
index 83e05bb22f..ae1cd280be 100644
--- a/2021/CVE-2021-4034.json
+++ b/2021/CVE-2021-4034.json
@@ -169,10 +169,10 @@
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)",
"fork": false,
"created_at": "2022-01-26T00:56:36Z",
- "updated_at": "2024-05-28T05:51:55Z",
+ "updated_at": "2024-05-30T06:46:09Z",
"pushed_at": "2023-05-04T19:24:39Z",
- "stargazers_count": 1024,
- "watchers_count": 1024,
+ "stargazers_count": 1025,
+ "watchers_count": 1025,
"has_discussions": false,
"forks_count": 308,
"allow_forking": true,
@@ -185,7 +185,7 @@
],
"visibility": "public",
"forks": 308,
- "watchers": 1024,
+ "watchers": 1025,
"score": 0,
"subscribers_count": 16
},
@@ -2042,10 +2042,10 @@
"description": "Pre-compiled builds for CVE-2021-4034",
"fork": false,
"created_at": "2022-01-27T17:43:24Z",
- "updated_at": "2023-09-28T11:35:25Z",
+ "updated_at": "2024-05-30T10:52:20Z",
"pushed_at": "2022-03-30T15:38:20Z",
- "stargazers_count": 20,
- "watchers_count": 20,
+ "stargazers_count": 21,
+ "watchers_count": 21,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@@ -2054,7 +2054,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
- "watchers": 20,
+ "watchers": 21,
"score": 0,
"subscribers_count": 1
},
diff --git a/2021/CVE-2021-42287.json b/2021/CVE-2021-42287.json
index 02a34f8648..a206ab7f05 100644
--- a/2021/CVE-2021-42287.json
+++ b/2021/CVE-2021-42287.json
@@ -73,10 +73,10 @@
"description": "NoPacScan is a CVE-2021-42287\/CVE-2021-42278 Scanner,it scan for more domain controllers than other script",
"fork": false,
"created_at": "2022-01-07T11:59:55Z",
- "updated_at": "2024-03-29T05:10:45Z",
+ "updated_at": "2024-05-30T07:05:22Z",
"pushed_at": "2022-02-17T04:12:08Z",
- "stargazers_count": 83,
- "watchers_count": 83,
+ "stargazers_count": 84,
+ "watchers_count": 84,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
- "watchers": 83,
+ "watchers": 84,
"score": 0,
"subscribers_count": 2
},
diff --git a/2021/CVE-2021-43893.json b/2021/CVE-2021-43893.json
index af5a5c8a63..dea89914df 100644
--- a/2021/CVE-2021-43893.json
+++ b/2021/CVE-2021-43893.json
@@ -13,10 +13,10 @@
"description": "Proof of Concept for EFSRPC Arbitrary File Upload (CVE-2021-43893)",
"fork": false,
"created_at": "2022-02-04T17:11:00Z",
- "updated_at": "2024-03-28T15:50:42Z",
+ "updated_at": "2024-05-30T08:10:14Z",
"pushed_at": "2022-02-14T14:26:26Z",
- "stargazers_count": 61,
- "watchers_count": 61,
+ "stargazers_count": 62,
+ "watchers_count": 62,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 14,
- "watchers": 61,
+ "watchers": 62,
"score": 0,
"subscribers_count": 1
}
diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json
index b7e8352303..322520cd3f 100644
--- a/2021/CVE-2021-44228.json
+++ b/2021/CVE-2021-44228.json
@@ -374,7 +374,7 @@
"stargazers_count": 1095,
"watchers_count": 1095,
"has_discussions": false,
- "forks_count": 527,
+ "forks_count": 528,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -382,7 +382,7 @@
"log4shell"
],
"visibility": "public",
- "forks": 527,
+ "forks": 528,
"watchers": 1095,
"score": 0,
"subscribers_count": 22
@@ -735,13 +735,13 @@
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
- "forks_count": 5,
+ "forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 5,
+ "forks": 6,
"watchers": 5,
"score": 0,
"subscribers_count": 1
diff --git a/2022/CVE-2022-0995.json b/2022/CVE-2022-0995.json
index 273b4491b0..af14c5b7b4 100644
--- a/2022/CVE-2022-0995.json
+++ b/2022/CVE-2022-0995.json
@@ -88,35 +88,5 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
- },
- {
- "id": 807439673,
- "name": "CVE-2022-0995",
- "full_name": "rootkalilocalhost\/CVE-2022-0995",
- "owner": {
- "login": "rootkalilocalhost",
- "id": 140280170,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/140280170?v=4",
- "html_url": "https:\/\/github.com\/rootkalilocalhost"
- },
- "html_url": "https:\/\/github.com\/rootkalilocalhost\/CVE-2022-0995",
- "description": null,
- "fork": false,
- "created_at": "2024-05-29T05:36:11Z",
- "updated_at": "2024-05-29T05:40:24Z",
- "pushed_at": "2024-05-29T05:40:21Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "has_discussions": false,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 0,
- "watchers": 0,
- "score": 0,
- "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-22947.json b/2022/CVE-2022-22947.json
index 2f031a321f..449f006d41 100644
--- a/2022/CVE-2022-22947.json
+++ b/2022/CVE-2022-22947.json
@@ -1284,10 +1284,10 @@
"description": "CVE-2022-22947 注入Godzilla内存马",
"fork": false,
"created_at": "2022-04-26T05:48:27Z",
- "updated_at": "2024-05-06T15:25:09Z",
+ "updated_at": "2024-05-30T09:18:14Z",
"pushed_at": "2022-04-26T05:55:58Z",
- "stargazers_count": 199,
- "watchers_count": 199,
+ "stargazers_count": 200,
+ "watchers_count": 200,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@@ -1296,7 +1296,7 @@
"topics": [],
"visibility": "public",
"forks": 27,
- "watchers": 199,
+ "watchers": 200,
"score": 0,
"subscribers_count": 5
},
diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json
index 3071e1963a..3bc3f83948 100644
--- a/2022/CVE-2022-22954.json
+++ b/2022/CVE-2022-22954.json
@@ -766,10 +766,10 @@
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
- "updated_at": "2024-05-30T05:33:40Z",
+ "updated_at": "2024-05-30T08:52:19Z",
"pushed_at": "2024-04-25T06:09:38Z",
- "stargazers_count": 1261,
- "watchers_count": 1261,
+ "stargazers_count": 1263,
+ "watchers_count": 1263,
"has_discussions": false,
"forks_count": 160,
"allow_forking": true,
@@ -785,7 +785,7 @@
],
"visibility": "public",
"forks": 160,
- "watchers": 1261,
+ "watchers": 1263,
"score": 0,
"subscribers_count": 14
},
diff --git a/2022/CVE-2022-37706.json b/2022/CVE-2022-37706.json
index 1acddd6ac2..a061085420 100644
--- a/2022/CVE-2022-37706.json
+++ b/2022/CVE-2022-37706.json
@@ -13,10 +13,10 @@
"description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)",
"fork": false,
"created_at": "2022-09-12T19:22:44Z",
- "updated_at": "2024-05-30T04:23:27Z",
+ "updated_at": "2024-05-30T10:36:53Z",
"pushed_at": "2022-09-19T19:41:34Z",
- "stargazers_count": 251,
- "watchers_count": 251,
+ "stargazers_count": 252,
+ "watchers_count": 252,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 36,
- "watchers": 251,
+ "watchers": 252,
"score": 0,
"subscribers_count": 5
},
diff --git a/2022/CVE-2022-39197.json b/2022/CVE-2022-39197.json
index 1ca8136dd4..4bcd86050d 100644
--- a/2022/CVE-2022-39197.json
+++ b/2022/CVE-2022-39197.json
@@ -411,10 +411,10 @@
"description": "Cobalt Strike 4.4 猪猪版 去暗桩 去流量特征 beacon仿造真实API服务 修补CVE-2022-39197补丁",
"fork": false,
"created_at": "2023-04-28T06:31:38Z",
- "updated_at": "2024-05-22T11:29:11Z",
+ "updated_at": "2024-05-30T09:56:01Z",
"pushed_at": "2023-04-28T07:10:00Z",
- "stargazers_count": 32,
- "watchers_count": 32,
+ "stargazers_count": 33,
+ "watchers_count": 33,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -423,7 +423,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 32,
+ "watchers": 33,
"score": 0,
"subscribers_count": 1
},
diff --git a/2022/CVE-2022-41082.json b/2022/CVE-2022-41082.json
index 51141670d6..c327e683e5 100644
--- a/2022/CVE-2022-41082.json
+++ b/2022/CVE-2022-41082.json
@@ -13,10 +13,10 @@
"description": "Nmap scripts to detect exchange 0-day (CVE-2022-41082) vulnerability",
"fork": false,
"created_at": "2022-10-01T11:53:14Z",
- "updated_at": "2024-01-02T10:32:08Z",
+ "updated_at": "2024-05-30T08:24:12Z",
"pushed_at": "2023-01-03T08:37:33Z",
- "stargazers_count": 79,
- "watchers_count": 79,
+ "stargazers_count": 80,
+ "watchers_count": 80,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
- "watchers": 79,
+ "watchers": 80,
"score": 0,
"subscribers_count": 1
},
diff --git a/2022/CVE-2022-46169.json b/2022/CVE-2022-46169.json
index b74c221b6f..d07aef084e 100644
--- a/2022/CVE-2022-46169.json
+++ b/2022/CVE-2022-46169.json
@@ -164,14 +164,14 @@
{
"id": 588437634,
"name": "CVE-2022-46169",
- "full_name": "botfather0x0\/CVE-2022-46169",
+ "full_name": "c3rrberu5\/CVE-2022-46169",
"owner": {
- "login": "botfather0x0",
+ "login": "c3rrberu5",
"id": 109983457,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109983457?v=4",
- "html_url": "https:\/\/github.com\/botfather0x0"
+ "html_url": "https:\/\/github.com\/c3rrberu5"
},
- "html_url": "https:\/\/github.com\/botfather0x0\/CVE-2022-46169",
+ "html_url": "https:\/\/github.com\/c3rrberu5\/CVE-2022-46169",
"description": "Exploit to CVE-2022-46169 vulnerability",
"fork": false,
"created_at": "2023-01-13T05:37:56Z",
diff --git a/2023/CVE-2023-2024.json b/2023/CVE-2023-2024.json
index f8d1944cff..d627b9b91f 100644
--- a/2023/CVE-2023-2024.json
+++ b/2023/CVE-2023-2024.json
@@ -13,8 +13,8 @@
"description": "For Aina",
"fork": false,
"created_at": "2023-12-04T15:55:22Z",
- "updated_at": "2024-05-05T19:45:55Z",
- "pushed_at": "2024-05-05T19:45:52Z",
+ "updated_at": "2024-05-30T11:28:31Z",
+ "pushed_at": "2024-05-30T11:28:28Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
diff --git a/2023/CVE-2023-20963.json b/2023/CVE-2023-20963.json
index e78d7ff10d..0162978e97 100644
--- a/2023/CVE-2023-20963.json
+++ b/2023/CVE-2023-20963.json
@@ -13,10 +13,10 @@
"description": "CVE-2023-20963 PoC (Android WorkSource parcel\/unparcel logic mismatch)",
"fork": false,
"created_at": "2023-06-12T10:44:59Z",
- "updated_at": "2024-05-15T06:21:44Z",
+ "updated_at": "2024-05-30T09:40:11Z",
"pushed_at": "2024-04-27T20:15:24Z",
- "stargazers_count": 36,
- "watchers_count": 36,
+ "stargazers_count": 37,
+ "watchers_count": 37,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
- "watchers": 36,
+ "watchers": 37,
"score": 0,
"subscribers_count": 1
},
diff --git a/2023/CVE-2023-21768.json b/2023/CVE-2023-21768.json
index b307be086b..c367c2919a 100644
--- a/2023/CVE-2023-21768.json
+++ b/2023/CVE-2023-21768.json
@@ -43,10 +43,10 @@
"description": "cve-2023-21768",
"fork": false,
"created_at": "2023-03-10T03:36:52Z",
- "updated_at": "2024-04-01T22:52:57Z",
+ "updated_at": "2024-05-30T09:49:39Z",
"pushed_at": "2023-03-10T04:03:04Z",
- "stargazers_count": 12,
- "watchers_count": 12,
+ "stargazers_count": 13,
+ "watchers_count": 13,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
- "watchers": 12,
+ "watchers": 13,
"score": 0,
"subscribers_count": 1
},
diff --git a/2023/CVE-2023-21839.json b/2023/CVE-2023-21839.json
index b4f62d804e..60bbedc31e 100644
--- a/2023/CVE-2023-21839.json
+++ b/2023/CVE-2023-21839.json
@@ -73,10 +73,10 @@
"description": "CVE-2023-21839工具",
"fork": false,
"created_at": "2023-03-11T08:26:30Z",
- "updated_at": "2024-01-07T11:06:41Z",
+ "updated_at": "2024-05-30T11:01:54Z",
"pushed_at": "2023-03-11T08:28:28Z",
- "stargazers_count": 26,
- "watchers_count": 26,
+ "stargazers_count": 25,
+ "watchers_count": 25,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
- "watchers": 26,
+ "watchers": 25,
"score": 0,
"subscribers_count": 3
},
diff --git a/2023/CVE-2023-22527.json b/2023/CVE-2023-22527.json
index 5bf1461006..af6e769c94 100644
--- a/2023/CVE-2023-22527.json
+++ b/2023/CVE-2023-22527.json
@@ -556,10 +556,10 @@
"description": "CVE-2023-22527 内存马注入工具",
"fork": false,
"created_at": "2024-02-11T16:46:55Z",
- "updated_at": "2024-05-09T14:32:21Z",
+ "updated_at": "2024-05-30T07:08:33Z",
"pushed_at": "2024-02-21T05:49:59Z",
- "stargazers_count": 61,
- "watchers_count": 61,
+ "stargazers_count": 62,
+ "watchers_count": 62,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@@ -568,7 +568,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
- "watchers": 61,
+ "watchers": 62,
"score": 0,
"subscribers_count": 1
},
@@ -586,10 +586,10 @@
"description": "confluence CVE-2023-22527 漏洞利用工具,支持冰蝎\/哥斯拉内存马注入,支持设置 http 代理",
"fork": false,
"created_at": "2024-02-26T02:34:44Z",
- "updated_at": "2024-05-30T01:06:34Z",
+ "updated_at": "2024-05-30T08:33:14Z",
"pushed_at": "2024-04-24T02:34:16Z",
- "stargazers_count": 26,
- "watchers_count": 26,
+ "stargazers_count": 28,
+ "watchers_count": 28,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -598,7 +598,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 26,
+ "watchers": 28,
"score": 0,
"subscribers_count": 1
},
diff --git a/2023/CVE-2023-29489.json b/2023/CVE-2023-29489.json
index 930049e404..68ba9c7933 100644
--- a/2023/CVE-2023-29489.json
+++ b/2023/CVE-2023-29489.json
@@ -253,8 +253,8 @@
"description": "CVE-2023-29489-XSS",
"fork": false,
"created_at": "2023-06-01T18:13:17Z",
- "updated_at": "2024-05-29T20:33:19Z",
- "pushed_at": "2024-05-29T20:33:16Z",
+ "updated_at": "2024-05-30T08:33:03Z",
+ "pushed_at": "2024-05-30T08:32:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@@ -580,7 +580,7 @@
"subscribers_count": 0
},
{
- "id": 807969116,
+ "id": 807997088,
"name": "CVE-2023-29489",
"full_name": "md-thalal\/CVE-2023-29489",
"owner": {
@@ -592,9 +592,9 @@
"html_url": "https:\/\/github.com\/md-thalal\/CVE-2023-29489",
"description": null,
"fork": false,
- "created_at": "2024-05-30T06:07:47Z",
- "updated_at": "2024-05-30T06:30:46Z",
- "pushed_at": "2024-05-30T06:30:43Z",
+ "created_at": "2024-05-30T07:20:09Z",
+ "updated_at": "2024-05-30T10:04:03Z",
+ "pushed_at": "2024-05-30T10:03:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
diff --git a/2023/CVE-2023-30253.json b/2023/CVE-2023-30253.json
index 9ee5a999e4..ecd20d61e9 100644
--- a/2023/CVE-2023-30253.json
+++ b/2023/CVE-2023-30253.json
@@ -73,10 +73,10 @@
"description": "Reverse Shell POC exploit for Dolibarr <= 17.0.0 (CVE-2023-30253), PHP Code Injection",
"fork": false,
"created_at": "2024-05-27T15:10:12Z",
- "updated_at": "2024-05-29T18:28:22Z",
+ "updated_at": "2024-05-30T08:58:15Z",
"pushed_at": "2024-05-28T15:10:20Z",
- "stargazers_count": 3,
- "watchers_count": 3,
+ "stargazers_count": 4,
+ "watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 3,
+ "watchers": 4,
"score": 0,
"subscribers_count": 1
}
diff --git a/2023/CVE-2023-32233.json b/2023/CVE-2023-32233.json
index 3030b4f5c5..3dc7a44ab8 100644
--- a/2023/CVE-2023-32233.json
+++ b/2023/CVE-2023-32233.json
@@ -148,35 +148,5 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
- },
- {
- "id": 807442373,
- "name": "CVE-2023-32233",
- "full_name": "rootkalilocalhost\/CVE-2023-32233",
- "owner": {
- "login": "rootkalilocalhost",
- "id": 140280170,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/140280170?v=4",
- "html_url": "https:\/\/github.com\/rootkalilocalhost"
- },
- "html_url": "https:\/\/github.com\/rootkalilocalhost\/CVE-2023-32233",
- "description": null,
- "fork": false,
- "created_at": "2024-05-29T05:44:11Z",
- "updated_at": "2024-05-29T05:47:28Z",
- "pushed_at": "2024-05-29T05:47:25Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "has_discussions": false,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 0,
- "watchers": 0,
- "score": 0,
- "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2023/CVE-2023-38408.json b/2023/CVE-2023-38408.json
index 08887bc356..6416698fbd 100644
--- a/2023/CVE-2023-38408.json
+++ b/2023/CVE-2023-38408.json
@@ -13,10 +13,10 @@
"description": "PoC for the recent critical vuln affecting OpenSSH versions < 9.3p2",
"fork": false,
"created_at": "2023-08-09T19:56:07Z",
- "updated_at": "2024-05-14T10:12:15Z",
+ "updated_at": "2024-05-30T11:02:37Z",
"pushed_at": "2023-08-10T05:12:20Z",
- "stargazers_count": 29,
- "watchers_count": 29,
+ "stargazers_count": 30,
+ "watchers_count": 30,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
- "watchers": 29,
+ "watchers": 30,
"score": 0,
"subscribers_count": 1
},
diff --git a/2023/CVE-2023-50386.json b/2023/CVE-2023-50386.json
index ebffc6086a..af37e9b10a 100644
--- a/2023/CVE-2023-50386.json
+++ b/2023/CVE-2023-50386.json
@@ -13,10 +13,10 @@
"description": "Apache Solr Backup\/Restore APIs RCE Poc (CVE-2023-50386)",
"fork": false,
"created_at": "2024-02-29T08:57:47Z",
- "updated_at": "2024-05-24T21:22:13Z",
+ "updated_at": "2024-05-30T08:45:36Z",
"pushed_at": "2024-02-29T12:54:56Z",
- "stargazers_count": 60,
- "watchers_count": 60,
+ "stargazers_count": 61,
+ "watchers_count": 61,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
- "watchers": 60,
+ "watchers": 61,
"score": 0,
"subscribers_count": 2
}
diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json
index 4706aff548..a36dec003d 100644
--- a/2024/CVE-2024-1086.json
+++ b/2024/CVE-2024-1086.json
@@ -13,10 +13,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
- "updated_at": "2024-05-29T19:10:26Z",
+ "updated_at": "2024-05-30T09:20:41Z",
"pushed_at": "2024-04-17T16:09:54Z",
- "stargazers_count": 1965,
- "watchers_count": 1965,
+ "stargazers_count": 1966,
+ "watchers_count": 1966,
"has_discussions": false,
"forks_count": 246,
"allow_forking": true,
@@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 246,
- "watchers": 1965,
+ "watchers": 1966,
"score": 0,
"subscribers_count": 21
},
diff --git a/2024/CVE-2024-21683.json b/2024/CVE-2024-21683.json
index c4196aceb8..6fd094cc72 100644
--- a/2024/CVE-2024-21683.json
+++ b/2024/CVE-2024-21683.json
@@ -43,10 +43,10 @@
"description": "CVE-2024-21683 Confluence Post Auth RCE",
"fork": false,
"created_at": "2024-05-23T09:05:40Z",
- "updated_at": "2024-05-30T03:21:43Z",
+ "updated_at": "2024-05-30T09:06:57Z",
"pushed_at": "2024-05-27T03:47:36Z",
- "stargazers_count": 93,
- "watchers_count": 93,
+ "stargazers_count": 95,
+ "watchers_count": 95,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@@ -59,7 +59,7 @@
],
"visibility": "public",
"forks": 21,
- "watchers": 93,
+ "watchers": 95,
"score": 0,
"subscribers_count": 1
},
diff --git a/2024/CVE-2024-21762.json b/2024/CVE-2024-21762.json
index adb2b39133..d7b0f8d200 100644
--- a/2024/CVE-2024-21762.json
+++ b/2024/CVE-2024-21762.json
@@ -73,10 +73,10 @@
"description": "out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability ",
"fork": false,
"created_at": "2024-03-13T09:17:28Z",
- "updated_at": "2024-05-26T21:26:24Z",
+ "updated_at": "2024-05-30T09:02:12Z",
"pushed_at": "2024-03-16T00:35:12Z",
- "stargazers_count": 98,
- "watchers_count": 98,
+ "stargazers_count": 99,
+ "watchers_count": 99,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
- "watchers": 98,
+ "watchers": 99,
"score": 0,
"subscribers_count": 5
},
diff --git a/2024/CVE-2024-23897.json b/2024/CVE-2024-23897.json
index 1a467c77a7..0f24aed496 100644
--- a/2024/CVE-2024-23897.json
+++ b/2024/CVE-2024-23897.json
@@ -256,10 +256,10 @@
"description": "CVE-2024-23897 - Jenkins 任意文件读取 利用工具",
"fork": false,
"created_at": "2024-01-27T19:34:48Z",
- "updated_at": "2024-05-30T03:45:28Z",
+ "updated_at": "2024-05-30T09:18:52Z",
"pushed_at": "2024-03-16T07:55:41Z",
- "stargazers_count": 59,
- "watchers_count": 59,
+ "stargazers_count": 60,
+ "watchers_count": 60,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@@ -272,7 +272,7 @@
],
"visibility": "public",
"forks": 10,
- "watchers": 59,
+ "watchers": 60,
"score": 0,
"subscribers_count": 2
},
diff --git a/2024/CVE-2024-24919.json b/2024/CVE-2024-24919.json
new file mode 100644
index 0000000000..b7a1e8129a
--- /dev/null
+++ b/2024/CVE-2024-24919.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 808011196,
+ "name": "CVE-2024-24919",
+ "full_name": "c3rrberu5\/CVE-2024-24919",
+ "owner": {
+ "login": "c3rrberu5",
+ "id": 109983457,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109983457?v=4",
+ "html_url": "https:\/\/github.com\/c3rrberu5"
+ },
+ "html_url": "https:\/\/github.com\/c3rrberu5\/CVE-2024-24919",
+ "description": "Nuclei Template to discover CVE-2024-24919. A path traversal vulnerability in CheckPoint SSLVPN.",
+ "fork": false,
+ "created_at": "2024-05-30T07:55:53Z",
+ "updated_at": "2024-05-30T07:58:13Z",
+ "pushed_at": "2024-05-30T07:58:10Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-27804.json b/2024/CVE-2024-27804.json
index 252c089e73..92454fa53b 100644
--- a/2024/CVE-2024-27804.json
+++ b/2024/CVE-2024-27804.json
@@ -13,10 +13,10 @@
"description": "POC for CVE-2024-27804",
"fork": false,
"created_at": "2024-05-14T14:17:06Z",
- "updated_at": "2024-05-30T00:35:37Z",
+ "updated_at": "2024-05-30T09:43:36Z",
"pushed_at": "2024-05-14T14:55:23Z",
- "stargazers_count": 111,
- "watchers_count": 111,
+ "stargazers_count": 112,
+ "watchers_count": 112,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
- "watchers": 111,
+ "watchers": 112,
"score": 0,
"subscribers_count": 4
}
diff --git a/2024/CVE-2024-2961.json b/2024/CVE-2024-2961.json
index b002bbd1b1..e92521774e 100644
--- a/2024/CVE-2024-2961.json
+++ b/2024/CVE-2024-2961.json
@@ -73,19 +73,19 @@
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
"fork": false,
"created_at": "2024-05-27T08:30:06Z",
- "updated_at": "2024-05-30T05:58:24Z",
+ "updated_at": "2024-05-30T12:21:35Z",
"pushed_at": "2024-05-28T03:19:34Z",
- "stargazers_count": 156,
- "watchers_count": 156,
+ "stargazers_count": 186,
+ "watchers_count": 186,
"has_discussions": false,
- "forks_count": 18,
+ "forks_count": 24,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 18,
- "watchers": 156,
+ "forks": 24,
+ "watchers": 186,
"score": 0,
"subscribers_count": 4
}
diff --git a/2024/CVE-2024-30056.json b/2024/CVE-2024-30056.json
index 0865579881..b0a3c58873 100644
--- a/2024/CVE-2024-30056.json
+++ b/2024/CVE-2024-30056.json
@@ -13,10 +13,10 @@
"description": "CVE-2024-30056 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability",
"fork": false,
"created_at": "2024-05-27T06:37:34Z",
- "updated_at": "2024-05-29T22:46:50Z",
+ "updated_at": "2024-05-30T08:49:48Z",
"pushed_at": "2024-05-27T06:47:27Z",
- "stargazers_count": 10,
- "watchers_count": 10,
+ "stargazers_count": 11,
+ "watchers_count": 11,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
- "watchers": 10,
+ "watchers": 11,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-3094.json b/2024/CVE-2024-3094.json
index 1618bd6293..063e38055c 100644
--- a/2024/CVE-2024-3094.json
+++ b/2024/CVE-2024-3094.json
@@ -1012,7 +1012,7 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
- "updated_at": "2024-05-29T14:58:48Z",
+ "updated_at": "2024-05-30T09:02:24Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3471,
"watchers_count": 3471,
diff --git a/2024/CVE-2024-32002.json b/2024/CVE-2024-32002.json
index dd0d344485..44e583a0b2 100644
--- a/2024/CVE-2024-32002.json
+++ b/2024/CVE-2024-32002.json
@@ -73,12 +73,12 @@
"description": "Exploit PoC for CVE-2024-32002",
"fork": false,
"created_at": "2024-05-17T19:33:08Z",
- "updated_at": "2024-05-30T05:41:20Z",
+ "updated_at": "2024-05-30T11:35:44Z",
"pushed_at": "2024-05-19T07:12:00Z",
- "stargazers_count": 305,
- "watchers_count": 305,
+ "stargazers_count": 316,
+ "watchers_count": 316,
"has_discussions": false,
- "forks_count": 88,
+ "forks_count": 93,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -89,8 +89,8 @@
"rce"
],
"visibility": "public",
- "forks": 88,
- "watchers": 305,
+ "forks": 93,
+ "watchers": 316,
"score": 0,
"subscribers_count": 3
},
@@ -235,10 +235,10 @@
"description": "CVE-2024-32002 RCE PoC",
"fork": false,
"created_at": "2024-05-18T15:05:28Z",
- "updated_at": "2024-05-29T03:29:08Z",
+ "updated_at": "2024-05-30T10:23:24Z",
"pushed_at": "2024-05-18T15:12:59Z",
- "stargazers_count": 80,
- "watchers_count": 80,
+ "stargazers_count": 83,
+ "watchers_count": 83,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@@ -251,7 +251,7 @@
],
"visibility": "public",
"forks": 20,
- "watchers": 80,
+ "watchers": 83,
"score": 0,
"subscribers_count": 1
},
@@ -1344,5 +1344,65 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 808085235,
+ "name": "CVE-2024-32002-sub",
+ "full_name": "TanMolk\/CVE-2024-32002-sub",
+ "owner": {
+ "login": "TanMolk",
+ "id": 114300129,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114300129?v=4",
+ "html_url": "https:\/\/github.com\/TanMolk"
+ },
+ "html_url": "https:\/\/github.com\/TanMolk\/CVE-2024-32002-sub",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-30T10:58:17Z",
+ "updated_at": "2024-05-30T11:07:11Z",
+ "pushed_at": "2024-05-30T11:07:08Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 808086341,
+ "name": "CVE-2024-32002",
+ "full_name": "TanMolk\/CVE-2024-32002",
+ "owner": {
+ "login": "TanMolk",
+ "id": 114300129,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114300129?v=4",
+ "html_url": "https:\/\/github.com\/TanMolk"
+ },
+ "html_url": "https:\/\/github.com\/TanMolk\/CVE-2024-32002",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-30T11:01:15Z",
+ "updated_at": "2024-05-30T11:01:35Z",
+ "pushed_at": "2024-05-30T11:01:32Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2024/CVE-2024-4367.json b/2024/CVE-2024-4367.json
index 2cf4496f62..788b6ca2fb 100644
--- a/2024/CVE-2024-4367.json
+++ b/2024/CVE-2024-4367.json
@@ -13,10 +13,10 @@
"description": "CVE-2024-4367 & CVE-2024-34342 Proof of Concept",
"fork": false,
"created_at": "2024-05-20T10:02:23Z",
- "updated_at": "2024-05-30T02:42:15Z",
+ "updated_at": "2024-05-30T07:19:49Z",
"pushed_at": "2024-05-23T10:07:41Z",
- "stargazers_count": 40,
- "watchers_count": 40,
+ "stargazers_count": 41,
+ "watchers_count": 41,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
- "watchers": 40,
+ "watchers": 41,
"score": 0,
"subscribers_count": 1
},
diff --git a/2024/CVE-2024-4956.json b/2024/CVE-2024-4956.json
index a73c12bf79..11e9eeeef4 100644
--- a/2024/CVE-2024-4956.json
+++ b/2024/CVE-2024-4956.json
@@ -246,5 +246,35 @@
"watchers": 2,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 808014744,
+ "name": "CVE-2024-4956-Sonatype-Nexus-Repository-Manager",
+ "full_name": "Praison001\/CVE-2024-4956-Sonatype-Nexus-Repository-Manager",
+ "owner": {
+ "login": "Praison001",
+ "id": 60835238,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60835238?v=4",
+ "html_url": "https:\/\/github.com\/Praison001"
+ },
+ "html_url": "https:\/\/github.com\/Praison001\/CVE-2024-4956-Sonatype-Nexus-Repository-Manager",
+ "description": "Exploit for CVE-2024-4956 affecting all previous Sonatype Nexus Repository 3.x OSS\/Pro versions up to and including 3.68.0",
+ "fork": false,
+ "created_at": "2024-05-30T08:04:27Z",
+ "updated_at": "2024-05-30T08:25:47Z",
+ "pushed_at": "2024-05-30T08:25:44Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/README.md b/README.md
index afa78b385e..5403d2c56e 100644
--- a/README.md
+++ b/README.md
@@ -623,6 +623,7 @@
- [eoslvs/CVE-2024-4956](https://github.com/eoslvs/CVE-2024-4956)
- [GoatSecurity/CVE-2024-4956](https://github.com/GoatSecurity/CVE-2024-4956)
- [TypicalModMaker/CVE-2024-4956](https://github.com/TypicalModMaker/CVE-2024-4956)
+- [Praison001/CVE-2024-4956-Sonatype-Nexus-Repository-Manager](https://github.com/Praison001/CVE-2024-4956-Sonatype-Nexus-Repository-Manager)
### CVE-2024-5084 (2024-05-23)
@@ -1392,6 +1393,13 @@
- [afine-com/CVE-2024-24816](https://github.com/afine-com/CVE-2024-24816)
+### CVE-2024-24919 (2024-05-28)
+
+Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available.
+
+
+- [c3rrberu5/CVE-2024-24919](https://github.com/c3rrberu5/CVE-2024-24919)
+
### CVE-2024-25092
- [RandomRobbieBF/CVE-2024-25092](https://github.com/RandomRobbieBF/CVE-2024-25092)
@@ -2061,6 +2069,8 @@
- [JakobTheDev/cve-2024-32002-submodule-aw](https://github.com/JakobTheDev/cve-2024-32002-submodule-aw)
- [JakobTheDev/cve-2024-32002-poc-aw](https://github.com/JakobTheDev/cve-2024-32002-poc-aw)
- [Goplush/CVE-2024-32002-git-rce](https://github.com/Goplush/CVE-2024-32002-git-rce)
+- [TanMolk/CVE-2024-32002-sub](https://github.com/TanMolk/CVE-2024-32002-sub)
+- [TanMolk/CVE-2024-32002](https://github.com/TanMolk/CVE-2024-32002)
### CVE-2024-32004 (2024-05-14)
@@ -6024,7 +6034,6 @@
- [oferchen/POC-CVE-2023-32233](https://github.com/oferchen/POC-CVE-2023-32233)
- [RogelioPumajulca/TEST-CVE-2023-32233](https://github.com/RogelioPumajulca/TEST-CVE-2023-32233)
- [void0red/CVE-2023-32233](https://github.com/void0red/CVE-2023-32233)
-- [rootkalilocalhost/CVE-2023-32233](https://github.com/rootkalilocalhost/CVE-2023-32233)
### CVE-2023-32235 (2023-05-05)
@@ -10454,7 +10463,6 @@
- [Bonfee/CVE-2022-0995](https://github.com/Bonfee/CVE-2022-0995)
- [AndreevSemen/CVE-2022-0995](https://github.com/AndreevSemen/CVE-2022-0995)
- [1nzag/CVE-2022-0995](https://github.com/1nzag/CVE-2022-0995)
-- [rootkalilocalhost/CVE-2022-0995](https://github.com/rootkalilocalhost/CVE-2022-0995)
### CVE-2022-0997 (2022-05-16)
@@ -16358,7 +16366,7 @@
- [taythebot/CVE-2022-46169](https://github.com/taythebot/CVE-2022-46169)
- [Inplex-sys/CVE-2022-46169](https://github.com/Inplex-sys/CVE-2022-46169)
- [sAsPeCt488/CVE-2022-46169](https://github.com/sAsPeCt488/CVE-2022-46169)
-- [botfather0x0/CVE-2022-46169](https://github.com/botfather0x0/CVE-2022-46169)
+- [c3rrberu5/CVE-2022-46169](https://github.com/c3rrberu5/CVE-2022-46169)
- [Habib0x0/CVE-2022-46169](https://github.com/Habib0x0/CVE-2022-46169)
- [N1arut/CVE-2022-46169_POC](https://github.com/N1arut/CVE-2022-46169_POC)
- [miko550/CVE-2022-46169](https://github.com/miko550/CVE-2022-46169)
@@ -24242,7 +24250,7 @@
- [dr4g0n23/CVE-2020-1472](https://github.com/dr4g0n23/CVE-2020-1472)
- [RicYaben/CVE-2020-1472-LAB](https://github.com/RicYaben/CVE-2020-1472-LAB)
- [Akash7350/CVE-2020-1472](https://github.com/Akash7350/CVE-2020-1472)
-- [botfather0x0/ZeroLogon-to-Shell](https://github.com/botfather0x0/ZeroLogon-to-Shell)
+- [c3rrberu5/ZeroLogon-to-Shell](https://github.com/c3rrberu5/ZeroLogon-to-Shell)
- [logg-1/0logon](https://github.com/logg-1/0logon)
- [whoami-chmod777/Zerologon-Attack-CVE-2020-1472-POC](https://github.com/whoami-chmod777/Zerologon-Attack-CVE-2020-1472-POC)
- [JolynNgSC/Zerologon_CVE-2020-1472](https://github.com/JolynNgSC/Zerologon_CVE-2020-1472)
@@ -43313,6 +43321,13 @@
## 2000
+### CVE-2000-0114 (2000-02-08)
+
+Frontpage Server Extensions allows remote attackers to determine the name of the anonymous account via an RPC POST request to shtml.dll in the /_vti_bin/ virtual directory.
+
+
+- [Cappricio-Securities/CVE-2000-0114](https://github.com/Cappricio-Securities/CVE-2000-0114)
+
### CVE-2000-0170 (2000-04-10)
Buffer overflow in the man program in Linux allows local users to gain privileges via the MANPAGER environmental variable.