diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 8042476239..ae5bfce2c6 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -133,10 +133,10 @@ "description": "Scanner for CVE-2020-0796 - SMBv3 RCE", "fork": false, "created_at": "2020-03-11T15:21:27Z", - "updated_at": "2024-10-07T18:46:50Z", + "updated_at": "2024-10-14T23:11:33Z", "pushed_at": "2020-10-01T08:36:29Z", - "stargazers_count": 664, - "watchers_count": 664, + "stargazers_count": 665, + "watchers_count": 665, "has_discussions": false, "forks_count": 199, "allow_forking": true, @@ -147,7 +147,7 @@ ], "visibility": "public", "forks": 199, - "watchers": 664, + "watchers": 665, "score": 0, "subscribers_count": 26 }, diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index e5eec85d8a..8fada7dc45 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -43,10 +43,10 @@ "description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527", "fork": false, "created_at": "2021-06-29T17:24:14Z", - "updated_at": "2024-10-13T02:17:31Z", + "updated_at": "2024-10-14T21:06:29Z", "pushed_at": "2021-07-20T15:28:13Z", - "stargazers_count": 1833, - "watchers_count": 1833, + "stargazers_count": 1834, + "watchers_count": 1834, "has_discussions": false, "forks_count": 583, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 583, - "watchers": 1833, + "watchers": 1834, "score": 0, "subscribers_count": 44 }, diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index 370cfff438..879e07b34a 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -52,13 +52,13 @@ "stargazers_count": 1958, "watchers_count": 1958, "has_discussions": false, - "forks_count": 510, + "forks_count": 511, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 510, + "forks": 511, "watchers": 1958, "score": 0, "subscribers_count": 20 diff --git a/2021/CVE-2021-42287.json b/2021/CVE-2021-42287.json index e41ad637ff..129379cf1e 100644 --- a/2021/CVE-2021-42287.json +++ b/2021/CVE-2021-42287.json @@ -13,10 +13,10 @@ "description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.", "fork": false, "created_at": "2021-12-11T19:27:30Z", - "updated_at": "2024-10-14T09:26:16Z", + "updated_at": "2024-10-14T22:45:38Z", "pushed_at": "2021-12-16T09:50:15Z", - "stargazers_count": 1329, - "watchers_count": 1329, + "stargazers_count": 1330, + "watchers_count": 1330, "has_discussions": false, "forks_count": 320, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 320, - "watchers": 1329, + "watchers": 1330, "score": 0, "subscribers_count": 27 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index bc4353efda..2ecef2aa2b 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -5844,10 +5844,10 @@ "description": "Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228", "fork": false, "created_at": "2021-12-14T18:08:45Z", - "updated_at": "2024-05-12T04:11:58Z", + "updated_at": "2024-10-14T22:09:15Z", "pushed_at": "2021-12-20T14:44:27Z", - "stargazers_count": 147, - "watchers_count": 147, + "stargazers_count": 148, + "watchers_count": 148, "has_discussions": false, "forks_count": 24, "allow_forking": true, @@ -5856,7 +5856,7 @@ "topics": [], "visibility": "public", "forks": 24, - "watchers": 147, + "watchers": 148, "score": 0, "subscribers_count": 6 }, diff --git a/2023/CVE-2023-0315.json b/2023/CVE-2023-0315.json index 49f0d0c2f6..5deee58e6d 100644 --- a/2023/CVE-2023-0315.json +++ b/2023/CVE-2023-0315.json @@ -13,10 +13,10 @@ "description": "The official exploit for Froxlor Remote Code Execution CVE-2023-0315", "fork": false, "created_at": "2023-01-29T21:20:26Z", - "updated_at": "2023-02-13T01:56:55Z", + "updated_at": "2024-10-14T21:55:53Z", "pushed_at": "2023-01-29T21:23:58Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 5, + "watchers": 6, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-41425.json b/2023/CVE-2023-41425.json index d9bb757dd8..4a2bdcea92 100644 --- a/2023/CVE-2023-41425.json +++ b/2023/CVE-2023-41425.json @@ -86,10 +86,10 @@ "description": "WonderCMS RCE CVE-2023-41425", "fork": false, "created_at": "2024-08-12T06:16:17Z", - "updated_at": "2024-10-07T01:29:17Z", + "updated_at": "2024-10-14T19:08:19Z", "pushed_at": "2024-08-12T06:55:30Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 13, + "watchers_count": 13, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -98,7 +98,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 12, + "watchers": 13, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-42793.json b/2023/CVE-2023-42793.json index 5d33df5577..32063df4a5 100644 --- a/2023/CVE-2023-42793.json +++ b/2023/CVE-2023-42793.json @@ -328,8 +328,8 @@ "description": "teamcity-exploit-cve-2023-42793", "fork": false, "created_at": "2024-09-20T12:15:25Z", - "updated_at": "2024-09-23T08:47:09Z", - "pushed_at": "2024-09-20T12:31:27Z", + "updated_at": "2024-10-14T22:21:08Z", + "pushed_at": "2024-10-14T22:21:04Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, diff --git a/2023/CVE-2023-51467.json b/2023/CVE-2023-51467.json index ad4d0bd7e3..6d07d03f9e 100644 --- a/2023/CVE-2023-51467.json +++ b/2023/CVE-2023-51467.json @@ -236,14 +236,14 @@ { "id": 742705000, "name": "BadBizness-CVE-2023-51467", - "full_name": "tw0point\/BadBizness-CVE-2023-51467", + "full_name": "2ptr\/BadBizness-CVE-2023-51467", "owner": { - "login": "tw0point", + "login": "2ptr", "id": 39099220, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39099220?v=4", - "html_url": "https:\/\/github.com\/tw0point" + "html_url": "https:\/\/github.com\/2ptr" }, - "html_url": "https:\/\/github.com\/tw0point\/BadBizness-CVE-2023-51467", + "html_url": "https:\/\/github.com\/2ptr\/BadBizness-CVE-2023-51467", "description": "Auto exploit script for the Java web framework OF Biz under CVE-2023-51467. ", "fork": false, "created_at": "2024-01-13T05:40:38Z", diff --git a/2024/CVE-2024-3094.json b/2024/CVE-2024-3094.json index f2ce45dad9..2b225ead9d 100644 --- a/2024/CVE-2024-3094.json +++ b/2024/CVE-2024-3094.json @@ -987,13 +987,13 @@ "stargazers_count": 3493, "watchers_count": 3493, "has_discussions": false, - "forks_count": 239, + "forks_count": 238, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 239, + "forks": 238, "watchers": 3493, "score": 0, "subscribers_count": 38 diff --git a/2024/CVE-2024-33559.json b/2024/CVE-2024-33559.json index b6f8d04b45..71ce636ed1 100644 --- a/2024/CVE-2024-33559.json +++ b/2024/CVE-2024-33559.json @@ -13,10 +13,10 @@ "description": "(CVE-2024-33559) The XStore theme for WordPress is vulnerable to SQL Injection due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query", "fork": false, "created_at": "2024-05-17T04:15:34Z", - "updated_at": "2024-08-16T22:26:35Z", + "updated_at": "2024-10-14T23:33:27Z", "pushed_at": "2024-05-17T04:20:29Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 6, + "watchers": 7, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-36401.json b/2024/CVE-2024-36401.json index bc3b7bb2a8..37a2884a9e 100644 --- a/2024/CVE-2024-36401.json +++ b/2024/CVE-2024-36401.json @@ -13,10 +13,10 @@ "description": "POC for CVE-2024-36401. This POC will attempt to establish a reverse shell from the vlun targets.", "fork": false, "created_at": "2024-07-04T13:19:47Z", - "updated_at": "2024-10-04T15:49:19Z", + "updated_at": "2024-10-14T22:22:09Z", "pushed_at": "2024-07-04T19:18:04Z", - "stargazers_count": 33, - "watchers_count": 33, + "stargazers_count": 32, + "watchers_count": 32, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 16, - "watchers": 33, + "watchers": 32, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-3656.json b/2024/CVE-2024-3656.json index b80744db7c..bea4f421ae 100644 --- a/2024/CVE-2024-3656.json +++ b/2024/CVE-2024-3656.json @@ -13,10 +13,10 @@ "description": "Keycloak admin API allows low privilege users to use administrative functions", "fork": false, "created_at": "2024-10-12T09:17:00Z", - "updated_at": "2024-10-14T10:44:00Z", + "updated_at": "2024-10-14T23:36:48Z", "pushed_at": "2024-10-12T09:48:10Z", - "stargazers_count": 14, - "watchers_count": 14, + "stargazers_count": 17, + "watchers_count": 17, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 14, + "watchers": 17, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-43044.json b/2024/CVE-2024-43044.json index 3f3b50f370..e45f4684c6 100644 --- a/2024/CVE-2024-43044.json +++ b/2024/CVE-2024-43044.json @@ -107,7 +107,7 @@ "description": "Exploit for the vulnerability CVE-2024-43044 in Jenkins", "fork": false, "created_at": "2024-08-23T20:26:26Z", - "updated_at": "2024-10-12T13:42:06Z", + "updated_at": "2024-10-14T23:44:20Z", "pushed_at": "2024-10-02T21:58:12Z", "stargazers_count": 157, "watchers_count": 157, diff --git a/2024/CVE-2024-4406.json b/2024/CVE-2024-4406.json index aff854e652..5ae689c07c 100644 --- a/2024/CVE-2024-4406.json +++ b/2024/CVE-2024-4406.json @@ -13,10 +13,10 @@ "description": "Files related to the Pwn2Own Toronto 2023 exploit against the Xiaomi 13 Pro.", "fork": false, "created_at": "2024-10-14T09:38:04Z", - "updated_at": "2024-10-14T13:52:45Z", + "updated_at": "2024-10-14T20:28:19Z", "pushed_at": "2024-10-14T09:43:53Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-45519.json b/2024/CVE-2024-45519.json index b583e3c387..d5da9a5c5a 100644 --- a/2024/CVE-2024-45519.json +++ b/2024/CVE-2024-45519.json @@ -43,19 +43,19 @@ "description": null, "fork": false, "created_at": "2024-09-28T08:29:06Z", - "updated_at": "2024-10-10T14:49:18Z", + "updated_at": "2024-10-14T23:38:26Z", "pushed_at": "2024-09-28T08:34:05Z", - "stargazers_count": 38, - "watchers_count": 38, + "stargazers_count": 39, + "watchers_count": 39, "has_discussions": false, - "forks_count": 17, + "forks_count": 18, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 17, - "watchers": 38, + "forks": 18, + "watchers": 39, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-8698.json b/2024/CVE-2024-8698.json index f3f11fc0f6..c5e30580db 100644 --- a/2024/CVE-2024-8698.json +++ b/2024/CVE-2024-8698.json @@ -18,13 +18,13 @@ "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 4, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-9464.json b/2024/CVE-2024-9464.json index 7cfb97a1ae..980e9381a8 100644 --- a/2024/CVE-2024-9464.json +++ b/2024/CVE-2024-9464.json @@ -13,10 +13,10 @@ "description": "Proof of Concept Exploit for CVE-2024-9464", "fork": false, "created_at": "2024-10-09T16:36:25Z", - "updated_at": "2024-10-14T17:37:13Z", + "updated_at": "2024-10-15T00:02:30Z", "pushed_at": "2024-10-09T16:41:41Z", - "stargazers_count": 30, - "watchers_count": 30, + "stargazers_count": 32, + "watchers_count": 32, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 30, + "watchers": 32, "score": 0, "subscribers_count": 4 } diff --git a/README.md b/README.md index f63d3ef963..4b90c1a186 100644 --- a/README.md +++ b/README.md @@ -13546,7 +13546,7 @@ - [Subha-BOO7/Exploit_CVE-2023-51467](https://github.com/Subha-BOO7/Exploit_CVE-2023-51467) - [JaneMandy/CVE-2023-51467-Exploit](https://github.com/JaneMandy/CVE-2023-51467-Exploit) - [vulncheck-oss/cve-2023-51467](https://github.com/vulncheck-oss/cve-2023-51467) -- [tw0point/BadBizness-CVE-2023-51467](https://github.com/tw0point/BadBizness-CVE-2023-51467) +- [2ptr/BadBizness-CVE-2023-51467](https://github.com/2ptr/BadBizness-CVE-2023-51467) - [AhmedMansour93/Event-ID-217-Rule-Name-SOC254-Apache-OFBiz-Auth-Bypass-and-Code-Injection-0Day-CVE-2023-51467-](https://github.com/AhmedMansour93/Event-ID-217-Rule-Name-SOC254-Apache-OFBiz-Auth-Bypass-and-Code-Injection-0Day-CVE-2023-51467-) ### CVE-2023-51504 (2024-02-05)