diff --git a/2017/CVE-2017-7921.json b/2017/CVE-2017-7921.json index 22fc25bb58..210bb62548 100644 --- a/2017/CVE-2017-7921.json +++ b/2017/CVE-2017-7921.json @@ -427,10 +427,10 @@ "description": " Test For CVE-2017–7921; ", "fork": false, "created_at": "2024-07-02T11:47:35Z", - "updated_at": "2024-11-13T19:15:00Z", + "updated_at": "2024-12-17T22:33:13Z", "pushed_at": "2024-07-02T12:00:01Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -439,7 +439,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 1 }, diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index e1b7b24908..fce3b5209e 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -590,10 +590,10 @@ "description": "Multithread SMB scanner to check CVE-2020-0796 for SMB v3.11", "fork": false, "created_at": "2020-03-12T20:07:44Z", - "updated_at": "2024-08-12T19:58:45Z", + "updated_at": "2024-12-17T20:04:29Z", "pushed_at": "2020-08-20T15:59:58Z", - "stargazers_count": 18, - "watchers_count": 18, + "stargazers_count": 19, + "watchers_count": 19, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -610,7 +610,7 @@ ], "visibility": "public", "forks": 8, - "watchers": 18, + "watchers": 19, "score": 0, "subscribers_count": 2 }, diff --git a/2020/CVE-2020-11110.json b/2020/CVE-2020-11110.json index d994782e55..c4005caf48 100644 --- a/2020/CVE-2020-11110.json +++ b/2020/CVE-2020-11110.json @@ -14,10 +14,10 @@ "description": "Proof of concept for CVE-2020-11110, for educational purpose only", "fork": false, "created_at": "2024-01-05T09:51:21Z", - "updated_at": "2024-01-07T17:49:28Z", + "updated_at": "2024-12-17T19:38:16Z", "pushed_at": "2024-01-05T09:54:03Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index 86608aa295..9924dc5d28 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -138,10 +138,10 @@ "description": "Exploit Code for CVE-2020-1472 aka Zerologon", "fork": false, "created_at": "2020-09-14T16:57:49Z", - "updated_at": "2024-12-02T21:23:44Z", + "updated_at": "2024-12-17T20:19:18Z", "pushed_at": "2020-11-05T16:37:20Z", - "stargazers_count": 384, - "watchers_count": 384, + "stargazers_count": 382, + "watchers_count": 382, "has_discussions": false, "forks_count": 67, "allow_forking": true, @@ -157,7 +157,7 @@ ], "visibility": "public", "forks": 67, - "watchers": 384, + "watchers": 382, "score": 0, "subscribers_count": 9 }, diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index 43f1d18fdc..c83b4f4671 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -45,10 +45,10 @@ "description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527", "fork": false, "created_at": "2021-06-29T17:24:14Z", - "updated_at": "2024-12-14T21:15:41Z", + "updated_at": "2024-12-17T20:19:21Z", "pushed_at": "2021-07-20T15:28:13Z", - "stargazers_count": 1847, - "watchers_count": 1847, + "stargazers_count": 1846, + "watchers_count": 1846, "has_discussions": false, "forks_count": 583, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 583, - "watchers": 1847, + "watchers": 1846, "score": 0, "subscribers_count": 43 }, @@ -311,10 +311,10 @@ "description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)", "fork": false, "created_at": "2021-07-01T23:45:58Z", - "updated_at": "2024-12-15T02:33:18Z", + "updated_at": "2024-12-17T20:19:21Z", "pushed_at": "2021-07-05T08:54:06Z", - "stargazers_count": 1022, - "watchers_count": 1022, + "stargazers_count": 1019, + "watchers_count": 1019, "has_discussions": false, "forks_count": 231, "allow_forking": true, @@ -323,7 +323,7 @@ "topics": [], "visibility": "public", "forks": 231, - "watchers": 1022, + "watchers": 1019, "score": 0, "subscribers_count": 26 }, diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index d054d3dcf1..9cab499659 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -486,10 +486,10 @@ "description": null, "fork": false, "created_at": "2021-01-30T20:39:58Z", - "updated_at": "2024-12-05T06:34:56Z", + "updated_at": "2024-12-17T20:19:20Z", "pushed_at": "2021-02-02T17:07:09Z", - "stargazers_count": 963, - "watchers_count": 963, + "stargazers_count": 960, + "watchers_count": 960, "has_discussions": false, "forks_count": 237, "allow_forking": true, @@ -498,7 +498,7 @@ "topics": [], "visibility": "public", "forks": 237, - "watchers": 963, + "watchers": 960, "score": 0, "subscribers_count": 27 }, @@ -831,10 +831,10 @@ "description": "Root shell PoC for CVE-2021-3156", "fork": false, "created_at": "2021-02-03T19:57:56Z", - "updated_at": "2024-12-02T21:22:21Z", + "updated_at": "2024-12-17T20:19:20Z", "pushed_at": "2022-02-13T12:21:53Z", - "stargazers_count": 146, - "watchers_count": 146, + "stargazers_count": 145, + "watchers_count": 145, "has_discussions": false, "forks_count": 61, "allow_forking": true, @@ -843,7 +843,7 @@ "topics": [], "visibility": "public", "forks": 61, - "watchers": 146, + "watchers": 145, "score": 0, "subscribers_count": 1 }, diff --git a/2021/CVE-2021-34527.json b/2021/CVE-2021-34527.json index 2098ed3b57..0664c1ab28 100644 --- a/2021/CVE-2021-34527.json +++ b/2021/CVE-2021-34527.json @@ -82,10 +82,10 @@ "description": null, "fork": false, "created_at": "2021-07-02T12:10:49Z", - "updated_at": "2024-12-13T02:11:55Z", + "updated_at": "2024-12-17T20:19:21Z", "pushed_at": "2021-07-02T12:17:50Z", - "stargazers_count": 266, - "watchers_count": 266, + "stargazers_count": 265, + "watchers_count": 265, "has_discussions": false, "forks_count": 68, "allow_forking": true, @@ -94,7 +94,7 @@ "topics": [], "visibility": "public", "forks": 68, - "watchers": 266, + "watchers": 265, "score": 0, "subscribers_count": 11 }, @@ -113,10 +113,10 @@ "description": "PrintNightmare - Windows Print Spooler RCE\/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits", "fork": false, "created_at": "2021-07-03T15:15:12Z", - "updated_at": "2024-12-17T00:28:40Z", + "updated_at": "2024-12-17T20:19:22Z", "pushed_at": "2021-09-13T12:12:17Z", - "stargazers_count": 128, - "watchers_count": 128, + "stargazers_count": 124, + "watchers_count": 124, "has_discussions": false, "forks_count": 39, "allow_forking": true, @@ -132,7 +132,7 @@ ], "visibility": "public", "forks": 39, - "watchers": 128, + "watchers": 124, "score": 0, "subscribers_count": 7 }, diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json index e108c8c2e6..5d7559f735 100644 --- a/2021/CVE-2021-42278.json +++ b/2021/CVE-2021-42278.json @@ -50,10 +50,10 @@ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-13T10:28:12Z", - "updated_at": "2024-12-10T15:39:29Z", + "updated_at": "2024-12-17T20:19:24Z", "pushed_at": "2023-01-29T03:31:27Z", - "stargazers_count": 817, - "watchers_count": 817, + "stargazers_count": 815, + "watchers_count": 815, "has_discussions": false, "forks_count": 124, "allow_forking": true, @@ -62,7 +62,7 @@ "topics": [], "visibility": "public", "forks": 124, - "watchers": 817, + "watchers": 815, "score": 0, "subscribers_count": 13 }, diff --git a/2021/CVE-2021-42287.json b/2021/CVE-2021-42287.json index 2fddfb3410..c37f25c425 100644 --- a/2021/CVE-2021-42287.json +++ b/2021/CVE-2021-42287.json @@ -14,10 +14,10 @@ "description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.", "fork": false, "created_at": "2021-12-11T19:27:30Z", - "updated_at": "2024-12-08T18:38:22Z", + "updated_at": "2024-12-17T20:19:24Z", "pushed_at": "2021-12-16T09:50:15Z", - "stargazers_count": 1346, - "watchers_count": 1346, + "stargazers_count": 1345, + "watchers_count": 1345, "has_discussions": false, "forks_count": 322, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 322, - "watchers": 1346, + "watchers": 1345, "score": 0, "subscribers_count": 27 }, diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index 44ed6a57df..918265066f 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -1163,19 +1163,19 @@ "description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.", "fork": false, "created_at": "2022-03-12T20:57:24Z", - "updated_at": "2024-12-12T11:17:44Z", + "updated_at": "2024-12-17T19:11:36Z", "pushed_at": "2023-05-20T05:55:45Z", - "stargazers_count": 560, - "watchers_count": 560, + "stargazers_count": 561, + "watchers_count": 561, "has_discussions": false, - "forks_count": 142, + "forks_count": 143, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 142, - "watchers": 560, + "forks": 143, + "watchers": 561, "score": 0, "subscribers_count": 15 }, diff --git a/2022/CVE-2022-21999.json b/2022/CVE-2022-21999.json index 56038ed0fd..2dc8cb80bc 100644 --- a/2022/CVE-2022-21999.json +++ b/2022/CVE-2022-21999.json @@ -14,10 +14,10 @@ "description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)", "fork": false, "created_at": "2022-02-08T17:25:44Z", - "updated_at": "2024-12-09T10:33:10Z", + "updated_at": "2024-12-17T20:19:24Z", "pushed_at": "2022-02-09T16:54:09Z", - "stargazers_count": 777, - "watchers_count": 777, + "stargazers_count": 776, + "watchers_count": 776, "has_discussions": false, "forks_count": 160, "allow_forking": true, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 160, - "watchers": 777, + "watchers": 776, "score": 0, "subscribers_count": 15 } diff --git a/2022/CVE-2022-22947.json b/2022/CVE-2022-22947.json index a74d39056b..6ffd51e7a9 100644 --- a/2022/CVE-2022-22947.json +++ b/2022/CVE-2022-22947.json @@ -200,10 +200,10 @@ "description": null, "fork": false, "created_at": "2022-03-04T02:27:50Z", - "updated_at": "2023-07-18T07:26:20Z", + "updated_at": "2024-12-17T18:28:40Z", "pushed_at": "2022-03-04T03:22:02Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -212,7 +212,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 1 }, diff --git a/2022/CVE-2022-26923.json b/2022/CVE-2022-26923.json index daefd1d8e3..05d3422cb0 100644 --- a/2022/CVE-2022-26923.json +++ b/2022/CVE-2022-26923.json @@ -45,19 +45,19 @@ "description": "The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment with the Active Directory Certificate Services (AD CS) server role installed.", "fork": false, "created_at": "2022-05-14T09:27:06Z", - "updated_at": "2024-08-20T05:11:44Z", + "updated_at": "2024-12-17T21:30:52Z", "pushed_at": "2022-05-14T20:56:39Z", - "stargazers_count": 42, - "watchers_count": 42, + "stargazers_count": 43, + "watchers_count": 43, "has_discussions": false, - "forks_count": 13, + "forks_count": 14, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 13, - "watchers": 42, + "forks": 14, + "watchers": 43, "score": 0, "subscribers_count": 4 }, diff --git a/2023/CVE-2023-21752.json b/2023/CVE-2023-21752.json index 279cd7c3b8..01652f6583 100644 --- a/2023/CVE-2023-21752.json +++ b/2023/CVE-2023-21752.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2023-01-10T15:59:26Z", - "updated_at": "2024-12-02T21:25:02Z", + "updated_at": "2024-12-17T20:19:27Z", "pushed_at": "2023-01-13T09:01:20Z", - "stargazers_count": 308, - "watchers_count": 308, + "stargazers_count": 307, + "watchers_count": 307, "has_discussions": false, "forks_count": 66, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 66, - "watchers": 308, + "watchers": 307, "score": 0, "subscribers_count": 5 }, diff --git a/2023/CVE-2023-27372.json b/2023/CVE-2023-27372.json index 935a1ff995..96bd88fbbb 100644 --- a/2023/CVE-2023-27372.json +++ b/2023/CVE-2023-27372.json @@ -14,10 +14,10 @@ "description": "SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions are 3.2.18, 4.0.10, 4.1.8, and 4.2.1.", "fork": false, "created_at": "2023-06-19T14:36:47Z", - "updated_at": "2024-12-14T15:59:20Z", + "updated_at": "2024-12-17T20:19:28Z", "pushed_at": "2024-10-13T21:08:54Z", - "stargazers_count": 64, - "watchers_count": 64, + "stargazers_count": 63, + "watchers_count": 63, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -41,7 +41,7 @@ ], "visibility": "public", "forks": 7, - "watchers": 64, + "watchers": 63, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-27566.json b/2023/CVE-2023-27566.json index 03459ce734..9f6239b2b3 100644 --- a/2023/CVE-2023-27566.json +++ b/2023/CVE-2023-27566.json @@ -14,10 +14,10 @@ "description": "MOC3ingbird Exploit for Live2D (CVE-2023-27566)", "fork": false, "created_at": "2023-03-03T01:57:28Z", - "updated_at": "2024-10-17T13:58:58Z", + "updated_at": "2024-12-18T00:00:45Z", "pushed_at": "2023-09-19T01:12:41Z", - "stargazers_count": 79, - "watchers_count": 79, + "stargazers_count": 80, + "watchers_count": 80, "has_discussions": true, "forks_count": 6, "allow_forking": true, @@ -33,7 +33,7 @@ ], "visibility": "public", "forks": 6, - "watchers": 79, + "watchers": 80, "score": 0, "subscribers_count": 2 } diff --git a/2023/CVE-2023-38709.json b/2023/CVE-2023-38709.json index bc1be55113..43984f71e6 100644 --- a/2023/CVE-2023-38709.json +++ b/2023/CVE-2023-38709.json @@ -14,10 +14,10 @@ "description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709", "fork": false, "created_at": "2024-10-05T20:32:45Z", - "updated_at": "2024-12-17T14:43:29Z", + "updated_at": "2024-12-17T21:02:40Z", "pushed_at": "2024-10-05T20:37:02Z", - "stargazers_count": 35, - "watchers_count": 35, + "stargazers_count": 37, + "watchers_count": 37, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -37,7 +37,7 @@ ], "visibility": "public", "forks": 7, - "watchers": 35, + "watchers": 37, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-45819.json b/2023/CVE-2023-45819.json index 65ecdc1a3f..67db96261d 100644 --- a/2023/CVE-2023-45819.json +++ b/2023/CVE-2023-45819.json @@ -14,10 +14,10 @@ "description": "Proof of concept for CVE-2023-45819", "fork": false, "created_at": "2024-12-17T15:19:33Z", - "updated_at": "2024-12-17T15:26:59Z", + "updated_at": "2024-12-17T18:46:35Z", "pushed_at": "2024-12-17T15:26:05Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 0 } diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index b4e1b3f9dc..2b889714d4 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -14,7 +14,7 @@ "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "fork": false, "created_at": "2024-01-16T06:52:02Z", - "updated_at": "2024-12-17T15:59:51Z", + "updated_at": "2024-12-17T20:18:04Z", "pushed_at": "2024-08-18T08:26:46Z", "stargazers_count": 1303, "watchers_count": 1303, diff --git a/2023/CVE-2023-48981.json b/2023/CVE-2023-48981.json index 01c6ed2ee3..497aeac8af 100644 --- a/2023/CVE-2023-48981.json +++ b/2023/CVE-2023-48981.json @@ -19,13 +19,13 @@ "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 diff --git a/2023/CVE-2023-51467.json b/2023/CVE-2023-51467.json index 6a485d5373..05eda3005f 100644 --- a/2023/CVE-2023-51467.json +++ b/2023/CVE-2023-51467.json @@ -128,10 +128,10 @@ "description": "This repo is a PoC with to exploit CVE-2023-51467 and CVE-2023-49070 preauth RCE vulnerabilities found in Apache OFBiz.", "fork": false, "created_at": "2024-01-02T14:20:10Z", - "updated_at": "2024-12-02T21:25:52Z", + "updated_at": "2024-12-17T20:19:30Z", "pushed_at": "2024-03-24T18:20:52Z", - "stargazers_count": 74, - "watchers_count": 74, + "stargazers_count": 73, + "watchers_count": 73, "has_discussions": false, "forks_count": 12, "allow_forking": true, @@ -140,7 +140,7 @@ "topics": [], "visibility": "public", "forks": 12, - "watchers": 74, + "watchers": 73, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-1071.json b/2024/CVE-2024-1071.json index e940beff82..3a2bbca97e 100644 --- a/2024/CVE-2024-1071.json +++ b/2024/CVE-2024-1071.json @@ -138,10 +138,10 @@ "description": "Proof of concept : CVE-2024-1071: WordPress Vulnerability Exploited", "fork": false, "created_at": "2024-08-30T04:23:04Z", - "updated_at": "2024-12-02T21:27:29Z", + "updated_at": "2024-12-17T20:19:30Z", "pushed_at": "2024-08-30T05:10:51Z", - "stargazers_count": 13, - "watchers_count": 13, + "stargazers_count": 12, + "watchers_count": 12, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -150,7 +150,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 13, + "watchers": 12, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json index 75f8b5dba5..a5aa9d4221 100644 --- a/2024/CVE-2024-1086.json +++ b/2024/CVE-2024-1086.json @@ -14,10 +14,10 @@ "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.", "fork": false, "created_at": "2024-03-20T21:16:41Z", - "updated_at": "2024-12-17T12:06:44Z", + "updated_at": "2024-12-17T20:19:30Z", "pushed_at": "2024-04-17T16:09:54Z", - "stargazers_count": 2302, - "watchers_count": 2302, + "stargazers_count": 2301, + "watchers_count": 2301, "has_discussions": false, "forks_count": 298, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 298, - "watchers": 2302, + "watchers": 2301, "score": 0, "subscribers_count": 26 }, diff --git a/2024/CVE-2024-12356.json b/2024/CVE-2024-12356.json index aa4d1688f5..212e7ce1b9 100644 --- a/2024/CVE-2024-12356.json +++ b/2024/CVE-2024-12356.json @@ -14,10 +14,10 @@ "description": "CVE-2024-12356: Improper Neutralization of Special Elements used in a Command ('Command Injection') (CWE-77)", "fork": false, "created_at": "2024-12-17T15:01:37Z", - "updated_at": "2024-12-17T15:31:53Z", + "updated_at": "2024-12-17T20:19:45Z", "pushed_at": "2024-12-17T15:31:40Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-27954.json b/2024/CVE-2024-27954.json index c40cd41049..26a59185eb 100644 --- a/2024/CVE-2024-27954.json +++ b/2024/CVE-2024-27954.json @@ -14,10 +14,10 @@ "description": "Automatic Plugin for WordPress < 3.92.1 Multiples Vulnerabilities", "fork": false, "created_at": "2024-10-29T00:46:35Z", - "updated_at": "2024-12-02T21:27:22Z", + "updated_at": "2024-12-17T20:19:31Z", "pushed_at": "2024-10-29T02:47:13Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 4, + "watchers": 3, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-28987.json b/2024/CVE-2024-28987.json index 9f92d1c9dd..3b80d41903 100644 --- a/2024/CVE-2024-28987.json +++ b/2024/CVE-2024-28987.json @@ -14,10 +14,10 @@ "description": "Web Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)", "fork": false, "created_at": "2024-09-05T09:01:58Z", - "updated_at": "2024-12-02T21:27:29Z", + "updated_at": "2024-12-17T20:19:30Z", "pushed_at": "2024-09-05T09:23:59Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 9, + "watchers_count": 9, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 10, + "watchers": 9, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-30051.json b/2024/CVE-2024-30051.json index 525d086dff..33e2dbc9d3 100644 --- a/2024/CVE-2024-30051.json +++ b/2024/CVE-2024-30051.json @@ -14,19 +14,19 @@ "description": null, "fork": false, "created_at": "2024-08-14T16:20:38Z", - "updated_at": "2024-12-15T09:26:28Z", + "updated_at": "2024-12-17T20:50:00Z", "pushed_at": "2024-09-05T23:21:00Z", - "stargazers_count": 110, - "watchers_count": 110, + "stargazers_count": 111, + "watchers_count": 111, "has_discussions": false, - "forks_count": 32, + "forks_count": 33, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 32, - "watchers": 110, + "forks": 33, + "watchers": 111, "score": 0, "subscribers_count": 2 } diff --git a/2024/CVE-2024-32002.json b/2024/CVE-2024-32002.json index 788728039f..c50b7638b0 100644 --- a/2024/CVE-2024-32002.json +++ b/2024/CVE-2024-32002.json @@ -76,7 +76,7 @@ "description": "Exploit PoC for CVE-2024-32002", "fork": false, "created_at": "2024-05-17T19:33:08Z", - "updated_at": "2024-12-13T10:10:23Z", + "updated_at": "2024-12-17T21:49:19Z", "pushed_at": "2024-05-19T07:12:00Z", "stargazers_count": 518, "watchers_count": 518, diff --git a/2024/CVE-2024-34470.json b/2024/CVE-2024-34470.json index 37832b0e5e..0dc4a4eb8c 100644 --- a/2024/CVE-2024-34470.json +++ b/2024/CVE-2024-34470.json @@ -45,10 +45,10 @@ "description": "POC and bulk scanner for CVE-2024-34470", "fork": false, "created_at": "2024-06-19T11:32:40Z", - "updated_at": "2024-12-02T21:26:42Z", + "updated_at": "2024-12-17T20:19:30Z", "pushed_at": "2024-06-19T21:22:15Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 5, + "watchers": 4, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-37742.json b/2024/CVE-2024-37742.json index f0d077058a..66101f83e5 100644 --- a/2024/CVE-2024-37742.json +++ b/2024/CVE-2024-37742.json @@ -2,15 +2,15 @@ { "id": 817975765, "name": "CVE-2024-37742", - "full_name": "Eteblue\/CVE-2024-37742", + "full_name": "Shadow3ore\/CVE-2024-37742", "owner": { - "login": "Eteblue", + "login": "Shadow3ore", "id": 151763816, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/151763816?v=4", - "html_url": "https:\/\/github.com\/Eteblue", + "html_url": "https:\/\/github.com\/Shadow3ore", "user_view_type": "public" }, - "html_url": "https:\/\/github.com\/Eteblue\/CVE-2024-37742", + "html_url": "https:\/\/github.com\/Shadow3ore\/CVE-2024-37742", "description": "This repository contains a PoC for exploiting CVE-2024-37742, a vulnerability in Safe Exam Browser (SEB) ≤ 3.5.0 on Windows. The vulnerability enables unauthorized clipboard data sharing between SEB's kiosk mode and the underlying system, compromising the integrity of exams.", "fork": false, "created_at": "2024-06-20T21:01:28Z", diff --git a/2024/CVE-2024-38472.json b/2024/CVE-2024-38472.json index 07bc3efbea..26d1fd7ef5 100644 --- a/2024/CVE-2024-38472.json +++ b/2024/CVE-2024-38472.json @@ -45,10 +45,10 @@ "description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709", "fork": false, "created_at": "2024-10-05T20:32:45Z", - "updated_at": "2024-12-17T14:43:29Z", + "updated_at": "2024-12-17T21:02:40Z", "pushed_at": "2024-10-05T20:37:02Z", - "stargazers_count": 35, - "watchers_count": 35, + "stargazers_count": 37, + "watchers_count": 37, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -68,7 +68,7 @@ ], "visibility": "public", "forks": 7, - "watchers": 35, + "watchers": 37, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-38819.json b/2024/CVE-2024-38819.json index cf2e0dbc91..0b65ca5f29 100644 --- a/2024/CVE-2024-38819.json +++ b/2024/CVE-2024-38819.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2024-12-14T09:22:33Z", - "updated_at": "2024-12-17T17:53:15Z", + "updated_at": "2024-12-17T19:30:18Z", "pushed_at": "2024-12-14T10:13:45Z", - "stargazers_count": 24, - "watchers_count": 24, + "stargazers_count": 25, + "watchers_count": 25, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 24, + "watchers": 25, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-45337.json b/2024/CVE-2024-45337.json new file mode 100644 index 0000000000..eca96e85c0 --- /dev/null +++ b/2024/CVE-2024-45337.json @@ -0,0 +1,74 @@ +[ + { + "id": 904960744, + "name": "CVE-2024-45337-POC", + "full_name": "NHAS\/CVE-2024-45337-POC", + "owner": { + "login": "NHAS", + "id": 6820641, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6820641?v=4", + "html_url": "https:\/\/github.com\/NHAS", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/NHAS\/CVE-2024-45337-POC", + "description": "Proof of concept (POC) for CVE-2024-45337 ", + "fork": false, + "created_at": "2024-12-17T22:07:53Z", + "updated_at": "2024-12-17T22:39:12Z", + "pushed_at": "2024-12-17T22:27:03Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "cve", + "cve-2024-45337", + "exploit", + "golang", + "hack", + "pentesting", + "poc", + "proof-of-concept", + "ssh" + ], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 0 + }, + { + "id": 904964693, + "name": "VULNERABLE-CVE-2024-45337", + "full_name": "NHAS\/VULNERABLE-CVE-2024-45337", + "owner": { + "login": "NHAS", + "id": 6820641, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6820641?v=4", + "html_url": "https:\/\/github.com\/NHAS", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/NHAS\/VULNERABLE-CVE-2024-45337", + "description": "An example project that showcases golang code vulnerable to CVE-2024-45337", + "fork": false, + "created_at": "2024-12-17T22:22:03Z", + "updated_at": "2024-12-17T22:25:52Z", + "pushed_at": "2024-12-17T22:25:48Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-4577.json b/2024/CVE-2024-4577.json index 93cff6f979..b921c15faf 100644 --- a/2024/CVE-2024-4577.json +++ b/2024/CVE-2024-4577.json @@ -1468,10 +1468,10 @@ "description": "PHP CGI Argument Injection (CVE-2024-4577) RCE", "fork": false, "created_at": "2024-08-20T02:56:03Z", - "updated_at": "2024-12-02T21:27:28Z", + "updated_at": "2024-12-17T20:19:30Z", "pushed_at": "2024-08-20T03:28:28Z", - "stargazers_count": 16, - "watchers_count": 16, + "stargazers_count": 15, + "watchers_count": 15, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -1480,7 +1480,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 16, + "watchers": 15, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-48990.json b/2024/CVE-2024-48990.json index 5266cbfe80..f4492091fa 100644 --- a/2024/CVE-2024-48990.json +++ b/2024/CVE-2024-48990.json @@ -19,13 +19,13 @@ "stargazers_count": 91, "watchers_count": 91, "has_discussions": false, - "forks_count": 17, + "forks_count": 16, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 17, + "forks": 16, "watchers": 91, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-49112.json b/2024/CVE-2024-49112.json index 841fed1283..6e2cdab498 100644 --- a/2024/CVE-2024-49112.json +++ b/2024/CVE-2024-49112.json @@ -14,7 +14,7 @@ "description": "A short scraper looking for a POC of CVE-2024-49112", "fork": false, "created_at": "2024-12-16T13:41:40Z", - "updated_at": "2024-12-17T16:19:26Z", + "updated_at": "2024-12-17T22:31:50Z", "pushed_at": "2024-12-16T19:35:02Z", "stargazers_count": 8, "watchers_count": 8, @@ -29,5 +29,36 @@ "watchers": 8, "score": 0, "subscribers_count": 1 + }, + { + "id": 904994970, + "name": "CVE-2024-49112-PoC", + "full_name": "b0l1o\/CVE-2024-49112-PoC", + "owner": { + "login": "b0l1o", + "id": 192051058, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/192051058?v=4", + "html_url": "https:\/\/github.com\/b0l1o", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/b0l1o\/CVE-2024-49112-PoC", + "description": "CVE-2024-49112 LDAP RCE PoC and Metasploit Module", + "fork": false, + "created_at": "2024-12-18T00:23:48Z", + "updated_at": "2024-12-18T00:25:41Z", + "pushed_at": "2024-12-18T00:25:38Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-49117.json b/2024/CVE-2024-49117.json new file mode 100644 index 0000000000..b5cb6b3429 --- /dev/null +++ b/2024/CVE-2024-49117.json @@ -0,0 +1,33 @@ +[ + { + "id": 904940803, + "name": "Microsoft-2024-December-Update-Control", + "full_name": "mutkus\/Microsoft-2024-December-Update-Control", + "owner": { + "login": "mutkus", + "id": 4324026, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4324026?v=4", + "html_url": "https:\/\/github.com\/mutkus", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/mutkus\/Microsoft-2024-December-Update-Control", + "description": "Microsoft Windows işletim sistemlerinde ki CVE-2024-49117, CVE-2024-49118, CVE-2024-49122 ve CVE-2024-49124 açıkları için KB kontrolü", + "fork": false, + "created_at": "2024-12-17T21:03:12Z", + "updated_at": "2024-12-17T21:21:36Z", + "pushed_at": "2024-12-17T21:21:32Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-53677.json b/2024/CVE-2024-53677.json index 5c495d78e0..994896d1b9 100644 --- a/2024/CVE-2024-53677.json +++ b/2024/CVE-2024-53677.json @@ -45,19 +45,19 @@ "description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.", "fork": false, "created_at": "2024-12-13T17:42:55Z", - "updated_at": "2024-12-17T16:39:28Z", + "updated_at": "2024-12-17T22:05:39Z", "pushed_at": "2024-12-17T03:44:06Z", - "stargazers_count": 42, - "watchers_count": 42, + "stargazers_count": 44, + "watchers_count": 44, "has_discussions": false, - "forks_count": 14, + "forks_count": 17, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 14, - "watchers": 42, + "forks": 17, + "watchers": 44, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-55968.json b/2024/CVE-2024-55968.json new file mode 100644 index 0000000000..7b3946f637 --- /dev/null +++ b/2024/CVE-2024-55968.json @@ -0,0 +1,64 @@ +[ + { + "id": 904942381, + "name": "CVE-2024-55968", + "full_name": "Wi1DN00B\/CVE-2024-55968", + "owner": { + "login": "Wi1DN00B", + "id": 103459492, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103459492?v=4", + "html_url": "https:\/\/github.com\/Wi1DN00B", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Wi1DN00B\/CVE-2024-55968", + "description": "Exploit POC Code for CVE-2024-55968", + "fork": false, + "created_at": "2024-12-17T21:07:59Z", + "updated_at": "2024-12-17T21:28:22Z", + "pushed_at": "2024-12-17T21:17:20Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 0 + }, + { + "id": 904942447, + "name": "CVE-2024-55968", + "full_name": "null-event\/CVE-2024-55968", + "owner": { + "login": "null-event", + "id": 47583736, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47583736?v=4", + "html_url": "https:\/\/github.com\/null-event", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/null-event\/CVE-2024-55968", + "description": "POC for DTEX LPE (CVE-2024-55968)", + "fork": false, + "created_at": "2024-12-17T21:08:11Z", + "updated_at": "2024-12-17T21:28:14Z", + "pushed_at": "2024-12-17T21:14:29Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-9935.json b/2024/CVE-2024-9935.json index 55386ca5f4..7c2255c90f 100644 --- a/2024/CVE-2024-9935.json +++ b/2024/CVE-2024-9935.json @@ -14,10 +14,10 @@ "description": "PDF Generator Addon for Elementor Page Builder <= 1.7.5 - Unauthenticated Arbitrary File Download", "fork": false, "created_at": "2024-11-18T10:14:45Z", - "updated_at": "2024-12-10T00:25:29Z", + "updated_at": "2024-12-17T20:19:31Z", "pushed_at": "2024-11-18T10:15:49Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 3, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/README.md b/README.md index 0e60511cde..1bec98d96e 100644 --- a/README.md +++ b/README.md @@ -5474,7 +5474,7 @@ Insecure Access Control in Safe Exam Browser (SEB) = 3.5.0 on Windows. The vulnerability allows an attacker to share clipboard data between the SEB kiosk mode and the underlying system, compromising exam integrity. By exploiting this flaw, an attacker can bypass exam controls and gain an unfair advantage during exams. -- [Eteblue/CVE-2024-37742](https://github.com/Eteblue/CVE-2024-37742) +- [Shadow3ore/CVE-2024-37742](https://github.com/Shadow3ore/CVE-2024-37742) ### CVE-2024-37759 (2024-06-24) @@ -6576,6 +6576,14 @@ - [TheHermione/CVE-2024-45265](https://github.com/TheHermione/CVE-2024-45265) +### CVE-2024-45337 (2024-12-11) + +Applications and libraries which misuse the ServerConfig.PublicKeyCallback callback may be susceptible to an authorization bypass. The documentation for ServerConfig.PublicKeyCallback says that "A call to this function does not guarantee that the key offered is in fact used to authenticate." Specifically, the SSH protocol allows clients to inquire about whether a public key is acceptable before proving control of the corresponding private key. PublicKeyCallback may be called with multiple keys, and the order in which the keys were provided cannot be used to infer which key the client successfully authenticated with, if any. Some applications, which store the key(s) passed to PublicKeyCallback (or derived information) and make security relevant determinations based on it once the connection is established, may make incorrect assumptions. For example, an attacker may send public keys A and B, and then authenticate with A. PublicKeyCallback would be called only twice, first with A and then with B. A vulnerable application may then make authorization decisions based on key B for which the attacker does not actually control the private key. Since this API is widely misused, as a partial mitigation golang.org/x/cry...@v0.31.0 enforces the property that, when successfully authenticating via public key, the last key passed to ServerConfig.PublicKeyCallback will be the key used to authenticate the connection. PublicKeyCallback will now be called multiple times with the same key, if necessary. Note that the client may still not control the last key passed to PublicKeyCallback if the connection is then authenticated with a different method, such as PasswordCallback, KeyboardInteractiveCallback, or NoClientAuth. Users should be using the Extensions field of the Permissions return value from the various authentication callbacks to record data associated with the authentication attempt instead of referencing external state. Once the connection is established the state corresponding to the successful authentication attempt can be retrieved via the ServerConn.Permissions field. Note that some third-party libraries misuse the Permissions type by sharing it across authentication attempts; users of third-party libraries should refer to the relevant projects for guidance. + + +- [NHAS/CVE-2024-45337-POC](https://github.com/NHAS/CVE-2024-45337-POC) +- [NHAS/VULNERABLE-CVE-2024-45337](https://github.com/NHAS/VULNERABLE-CVE-2024-45337) + ### CVE-2024-45383 (2024-09-12) A mishandling of IRP requests vulnerability exists in the HDAudBus_DMA interface of Microsoft High Definition Audio Bus Driver 10.0.19041.3636 (WinBuild.160101.0800). A specially crafted application can issue multiple IRP Complete requests which leads to a local denial-of-service. An attacker can execute malicious script/application to trigger this vulnerability. @@ -6951,6 +6959,14 @@ - [tnkr/poc_monitor](https://github.com/tnkr/poc_monitor) +- [b0l1o/CVE-2024-49112-PoC](https://github.com/b0l1o/CVE-2024-49112-PoC) + +### CVE-2024-49117 (2024-12-10) + +Windows Hyper-V Remote Code Execution Vulnerability + + +- [mutkus/Microsoft-2024-December-Update-Control](https://github.com/mutkus/Microsoft-2024-December-Update-Control) ### CVE-2024-49203 (2024-11-20) @@ -7456,7 +7472,7 @@ ### CVE-2024-53375 (2024-12-02) -Authenticated remote code execution (RCE) vulnerabilities affect TP-Link Archer, Deco, and Tapo series routers. A vulnerability exists in the "tmp_get_sites" function of the HomeShield functionality provided by TP-Link. This vulnerability is still exploitable without the installation or activation of the HomeShield functionality. +An Authenticated Remote Code Execution (RCE) vulnerability affects the TP-Link Archer router series. A vulnerability exists in the "tmp_get_sites" function of the HomeShield functionality provided by TP-Link. This vulnerability is still exploitable without the activation of the HomeShield functionality. - [ThottySploity/CVE-2024-53375](https://github.com/ThottySploity/CVE-2024-53375) @@ -7520,6 +7536,10 @@ - [JAckLosingHeart/CVE-2024-55875](https://github.com/JAckLosingHeart/CVE-2024-55875) +### CVE-2024-55968 +- [Wi1DN00B/CVE-2024-55968](https://github.com/Wi1DN00B/CVE-2024-55968) +- [null-event/CVE-2024-55968](https://github.com/null-event/CVE-2024-55968) + ### CVE-2024-56115 - [ComplianceControl/CVE-2024-56115](https://github.com/ComplianceControl/CVE-2024-56115)