From f062fc11d50fc5c63f14ee188363122fa85ce49f Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Sun, 27 Oct 2024 21:30:50 +0900 Subject: [PATCH] Auto Update 2024/10/27 12:30:50 --- 2016/CVE-2016-5195.json | 8 ++++---- 2019/CVE-2019-18371.json | 8 ++++---- 2019/CVE-2019-2618.json | 8 ++++---- 2020/CVE-2020-3452.json | 8 ++++---- 2021/CVE-2021-40444.json | 8 ++++---- 2022/CVE-2022-26134.json | 8 ++++---- 2022/CVE-2022-30592.json | 8 ++++---- 2023/CVE-2023-43261.json | 8 ++++---- 2023/CVE-2023-44976.json | 4 ++-- 2024/CVE-2024-0044.json | 8 ++++---- 2024/CVE-2024-0113.json | 33 +++++++++++++++++++++++++++++++++ 2024/CVE-2024-21762.json | 8 ++++---- 2024/CVE-2024-23113.json | 31 +++++++++++++++++++++++++++++++ 2024/CVE-2024-25600.json | 8 ++++---- 2024/CVE-2024-28987.json | 31 +++++++++++++++++++++++++++++++ 2024/CVE-2024-2961.json | 8 ++++---- 2024/CVE-2024-30090.json | 8 ++++---- 2024/CVE-2024-43532.json | 31 +++++++++++++++++++++++++++++++ 2024/CVE-2024-4406.json | 8 ++++---- 2024/CVE-2024-45519.json | 8 ++++---- 2024/CVE-2024-4577.json | 4 ++-- 2024/CVE-2024-47575.json | 31 +++++++++++++++++++++++++++++++ 2024/CVE-2024-48569.json | 33 +++++++++++++++++++++++++++++++++ 2024/CVE-2024-48904.json | 33 +++++++++++++++++++++++++++++++++ 2024/CVE-2024-6778.json | 12 ++++++------ 2024/CVE-2024-9264.json | 4 ++-- README.md | 17 +++++++++++++++++ 27 files changed, 312 insertions(+), 72 deletions(-) create mode 100644 2024/CVE-2024-0113.json create mode 100644 2024/CVE-2024-48569.json create mode 100644 2024/CVE-2024-48904.json diff --git a/2016/CVE-2016-5195.json b/2016/CVE-2016-5195.json index 10aef2b09a..4d9972ce61 100644 --- a/2016/CVE-2016-5195.json +++ b/2016/CVE-2016-5195.json @@ -462,10 +462,10 @@ "description": "Dirty Cow exploit - CVE-2016-5195", "fork": false, "created_at": "2016-11-25T21:08:01Z", - "updated_at": "2024-10-21T07:46:03Z", + "updated_at": "2024-10-27T09:08:04Z", "pushed_at": "2021-04-08T11:35:12Z", - "stargazers_count": 856, - "watchers_count": 856, + "stargazers_count": 857, + "watchers_count": 857, "has_discussions": false, "forks_count": 428, "allow_forking": true, @@ -478,7 +478,7 @@ ], "visibility": "public", "forks": 428, - "watchers": 856, + "watchers": 857, "score": 0, "subscribers_count": 9 }, diff --git a/2019/CVE-2019-18371.json b/2019/CVE-2019-18371.json index aa16a1ae32..4f04bfa0b3 100644 --- a/2019/CVE-2019-18371.json +++ b/2019/CVE-2019-18371.json @@ -14,10 +14,10 @@ "description": "A login bypass(CVE-2019-18371) and a command injection vulnerability(CVE-2019-18370) in Xiaomi Router R3G up to version 2.28.23.", "fork": false, "created_at": "2019-08-30T16:32:13Z", - "updated_at": "2024-09-24T20:30:05Z", + "updated_at": "2024-10-27T07:37:04Z", "pushed_at": "2020-01-12T02:34:45Z", - "stargazers_count": 181, - "watchers_count": 181, + "stargazers_count": 182, + "watchers_count": 182, "has_discussions": false, "forks_count": 31, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 31, - "watchers": 181, + "watchers": 182, "score": 0, "subscribers_count": 7 }, diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 1a23bee44a..2917eb71f8 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -107,10 +107,10 @@ "description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持", "fork": false, "created_at": "2019-06-21T09:22:43Z", - "updated_at": "2024-10-25T07:46:33Z", + "updated_at": "2024-10-27T08:24:18Z", "pushed_at": "2024-06-16T15:35:20Z", - "stargazers_count": 944, - "watchers_count": 944, + "stargazers_count": 945, + "watchers_count": 945, "has_discussions": false, "forks_count": 178, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 178, - "watchers": 944, + "watchers": 945, "score": 0, "subscribers_count": 18 }, diff --git a/2020/CVE-2020-3452.json b/2020/CVE-2020-3452.json index 40b543dab6..fd34ffb019 100644 --- a/2020/CVE-2020-3452.json +++ b/2020/CVE-2020-3452.json @@ -329,10 +329,10 @@ "description": "Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.", "fork": false, "created_at": "2020-09-28T05:00:37Z", - "updated_at": "2024-08-12T20:06:13Z", + "updated_at": "2024-10-27T07:00:57Z", "pushed_at": "2020-10-10T17:19:51Z", - "stargazers_count": 23, - "watchers_count": 23, + "stargazers_count": 24, + "watchers_count": 24, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -350,7 +350,7 @@ ], "visibility": "public", "forks": 11, - "watchers": 23, + "watchers": 24, "score": 0, "subscribers_count": 2 }, diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json index eea788350b..581310fc86 100644 --- a/2021/CVE-2021-40444.json +++ b/2021/CVE-2021-40444.json @@ -541,10 +541,10 @@ "description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit", "fork": false, "created_at": "2021-09-15T22:34:35Z", - "updated_at": "2024-09-25T00:16:44Z", + "updated_at": "2024-10-27T07:27:25Z", "pushed_at": "2023-10-11T18:44:51Z", - "stargazers_count": 796, - "watchers_count": 796, + "stargazers_count": 797, + "watchers_count": 797, "has_discussions": false, "forks_count": 169, "allow_forking": true, @@ -560,7 +560,7 @@ ], "visibility": "public", "forks": 169, - "watchers": 796, + "watchers": 797, "score": 0, "subscribers_count": 18 }, diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index dc024b030e..cc0a2bc38e 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -14,10 +14,10 @@ "description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。", "fork": false, "created_at": "2022-05-31T07:44:01Z", - "updated_at": "2024-10-25T09:10:36Z", + "updated_at": "2024-10-27T08:01:57Z", "pushed_at": "2023-02-26T14:06:05Z", - "stargazers_count": 1163, - "watchers_count": 1163, + "stargazers_count": 1162, + "watchers_count": 1162, "has_discussions": true, "forks_count": 190, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 190, - "watchers": 1163, + "watchers": 1162, "score": 0, "subscribers_count": 19 }, diff --git a/2022/CVE-2022-30592.json b/2022/CVE-2022-30592.json index 22cc70527a..f2f573b08c 100644 --- a/2022/CVE-2022-30592.json +++ b/2022/CVE-2022-30592.json @@ -14,10 +14,10 @@ "description": "HTTP3-attacks (CVE-2022-30592)", "fork": false, "created_at": "2022-08-06T09:57:43Z", - "updated_at": "2024-10-26T21:39:52Z", + "updated_at": "2024-10-27T07:14:29Z", "pushed_at": "2022-12-18T03:36:03Z", - "stargazers_count": 74, - "watchers_count": 74, + "stargazers_count": 75, + "watchers_count": 75, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 16, - "watchers": 74, + "watchers": 75, "score": 0, "subscribers_count": 4 } diff --git a/2023/CVE-2023-43261.json b/2023/CVE-2023-43261.json index 886f485170..732e892ea5 100644 --- a/2023/CVE-2023-43261.json +++ b/2023/CVE-2023-43261.json @@ -14,10 +14,10 @@ "description": "CVE-2023-43261 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption", "fork": false, "created_at": "2023-09-28T08:45:55Z", - "updated_at": "2024-08-12T20:32:49Z", + "updated_at": "2024-10-27T07:45:09Z", "pushed_at": "2023-10-01T08:36:06Z", - "stargazers_count": 54, - "watchers_count": 54, + "stargazers_count": 55, + "watchers_count": 55, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 8, - "watchers": 54, + "watchers": 55, "score": 0, "subscribers_count": 3 } diff --git a/2023/CVE-2023-44976.json b/2023/CVE-2023-44976.json index 75fa8fcdf5..9eacd9e42b 100644 --- a/2023/CVE-2023-44976.json +++ b/2023/CVE-2023-44976.json @@ -19,13 +19,13 @@ "stargazers_count": 87, "watchers_count": 87, "has_discussions": false, - "forks_count": 16, + "forks_count": 17, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 16, + "forks": 17, "watchers": 87, "score": 0, "subscribers_count": 2 diff --git a/2024/CVE-2024-0044.json b/2024/CVE-2024-0044.json index f33e2faa98..2e4257159c 100644 --- a/2024/CVE-2024-0044.json +++ b/2024/CVE-2024-0044.json @@ -297,10 +297,10 @@ "description": "PoC and writeup for bypassing the initial patch of CVE-2024-0044, Android run-as any app vulnerability allowing privilege escalation from adb to installed app", "fork": false, "created_at": "2024-09-27T09:02:08Z", - "updated_at": "2024-10-27T03:42:00Z", + "updated_at": "2024-10-27T12:22:43Z", "pushed_at": "2024-09-30T12:48:08Z", - "stargazers_count": 108, - "watchers_count": 108, + "stargazers_count": 109, + "watchers_count": 109, "has_discussions": false, "forks_count": 14, "allow_forking": true, @@ -309,7 +309,7 @@ "topics": [], "visibility": "public", "forks": 14, - "watchers": 108, + "watchers": 109, "score": 0, "subscribers_count": 3 } diff --git a/2024/CVE-2024-0113.json b/2024/CVE-2024-0113.json new file mode 100644 index 0000000000..810e6e1400 --- /dev/null +++ b/2024/CVE-2024-0113.json @@ -0,0 +1,33 @@ +[ + { + "id": 879251944, + "name": "CVE-2024-0113", + "full_name": "zetraxz\/CVE-2024-0113", + "owner": { + "login": "zetraxz", + "id": 186395163, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186395163?v=4", + "html_url": "https:\/\/github.com\/zetraxz", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/zetraxz\/CVE-2024-0113", + "description": null, + "fork": false, + "created_at": "2024-10-27T12:22:08Z", + "updated_at": "2024-10-27T12:22:12Z", + "pushed_at": "2024-10-27T12:22:09Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-21762.json b/2024/CVE-2024-21762.json index 223863443d..997b0c4ce4 100644 --- a/2024/CVE-2024-21762.json +++ b/2024/CVE-2024-21762.json @@ -76,10 +76,10 @@ "description": "out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability ", "fork": false, "created_at": "2024-03-13T09:17:28Z", - "updated_at": "2024-10-25T05:28:59Z", + "updated_at": "2024-10-27T09:37:22Z", "pushed_at": "2024-03-16T00:35:12Z", - "stargazers_count": 121, - "watchers_count": 121, + "stargazers_count": 122, + "watchers_count": 122, "has_discussions": false, "forks_count": 20, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 20, - "watchers": 121, + "watchers": 122, "score": 0, "subscribers_count": 5 }, diff --git a/2024/CVE-2024-23113.json b/2024/CVE-2024-23113.json index 502d977c9c..632492426b 100644 --- a/2024/CVE-2024-23113.json +++ b/2024/CVE-2024-23113.json @@ -184,5 +184,36 @@ "watchers": 1, "score": 0, "subscribers_count": 1 + }, + { + "id": 879202426, + "name": "CVE-2024-23113", + "full_name": "Jaden1419\/CVE-2024-23113", + "owner": { + "login": "Jaden1419", + "id": 186391854, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186391854?v=4", + "html_url": "https:\/\/github.com\/Jaden1419", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Jaden1419\/CVE-2024-23113", + "description": null, + "fork": false, + "created_at": "2024-10-27T09:32:08Z", + "updated_at": "2024-10-27T09:56:21Z", + "pushed_at": "2024-10-27T09:53:09Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-25600.json b/2024/CVE-2024-25600.json index c3ca75e5fb..be1df5750a 100644 --- a/2024/CVE-2024-25600.json +++ b/2024/CVE-2024-25600.json @@ -249,10 +249,10 @@ "description": "0BL1V10N's CVE-2024-25600 for Bricks Builder (TryHackMe) plugin for WordPress exploit", "fork": false, "created_at": "2024-06-02T10:49:03Z", - "updated_at": "2024-10-25T12:12:47Z", + "updated_at": "2024-10-27T12:20:13Z", "pushed_at": "2024-06-02T11:12:04Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": true, "forks_count": 0, "allow_forking": true, @@ -261,7 +261,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 4, + "watchers": 3, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-28987.json b/2024/CVE-2024-28987.json index dd1237a0c1..f24de26b14 100644 --- a/2024/CVE-2024-28987.json +++ b/2024/CVE-2024-28987.json @@ -122,5 +122,36 @@ "watchers": 4, "score": 0, "subscribers_count": 1 + }, + { + "id": 879205539, + "name": "CVE-2024-28987", + "full_name": "Jaden1419\/CVE-2024-28987", + "owner": { + "login": "Jaden1419", + "id": 186391854, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186391854?v=4", + "html_url": "https:\/\/github.com\/Jaden1419", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Jaden1419\/CVE-2024-28987", + "description": null, + "fork": false, + "created_at": "2024-10-27T09:43:54Z", + "updated_at": "2024-10-27T09:56:35Z", + "pushed_at": "2024-10-27T09:52:25Z", + "stargazers_count": 2, + "watchers_count": 2, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 2, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-2961.json b/2024/CVE-2024-2961.json index 2f8f62c0df..bf246d00d9 100644 --- a/2024/CVE-2024-2961.json +++ b/2024/CVE-2024-2961.json @@ -76,10 +76,10 @@ "description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()", "fork": false, "created_at": "2024-05-27T08:30:06Z", - "updated_at": "2024-10-22T11:12:22Z", + "updated_at": "2024-10-27T10:06:21Z", "pushed_at": "2024-09-30T08:45:56Z", - "stargazers_count": 404, - "watchers_count": 404, + "stargazers_count": 405, + "watchers_count": 405, "has_discussions": false, "forks_count": 52, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 52, - "watchers": 404, + "watchers": 405, "score": 0, "subscribers_count": 8 }, diff --git a/2024/CVE-2024-30090.json b/2024/CVE-2024-30090.json index 2b7deb7859..311d5e428f 100644 --- a/2024/CVE-2024-30090.json +++ b/2024/CVE-2024-30090.json @@ -14,10 +14,10 @@ "description": "CVE-2024-30090 - LPE PoC", "fork": false, "created_at": "2024-10-17T08:38:47Z", - "updated_at": "2024-10-26T20:35:55Z", + "updated_at": "2024-10-27T10:58:44Z", "pushed_at": "2024-10-17T09:53:33Z", - "stargazers_count": 75, - "watchers_count": 75, + "stargazers_count": 76, + "watchers_count": 76, "has_discussions": false, "forks_count": 18, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 18, - "watchers": 75, + "watchers": 76, "score": 0, "subscribers_count": 2 } diff --git a/2024/CVE-2024-43532.json b/2024/CVE-2024-43532.json index 880c772e57..13dca3b0d9 100644 --- a/2024/CVE-2024-43532.json +++ b/2024/CVE-2024-43532.json @@ -29,5 +29,36 @@ "watchers": 4, "score": 0, "subscribers_count": 1 + }, + { + "id": 879205634, + "name": "CVE-2024-43532", + "full_name": "Jaden1419\/CVE-2024-43532", + "owner": { + "login": "Jaden1419", + "id": 186391854, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186391854?v=4", + "html_url": "https:\/\/github.com\/Jaden1419", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Jaden1419\/CVE-2024-43532", + "description": null, + "fork": false, + "created_at": "2024-10-27T09:44:17Z", + "updated_at": "2024-10-27T09:56:17Z", + "pushed_at": "2024-10-27T09:53:56Z", + "stargazers_count": 2, + "watchers_count": 2, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 2, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-4406.json b/2024/CVE-2024-4406.json index 3ce18fef5c..82e47d629e 100644 --- a/2024/CVE-2024-4406.json +++ b/2024/CVE-2024-4406.json @@ -14,10 +14,10 @@ "description": "Files related to the Pwn2Own Toronto 2023 exploit against the Xiaomi 13 Pro.", "fork": false, "created_at": "2024-10-14T09:38:04Z", - "updated_at": "2024-10-21T03:17:37Z", + "updated_at": "2024-10-27T10:51:31Z", "pushed_at": "2024-10-14T09:43:53Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 8, + "watchers": 9, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-45519.json b/2024/CVE-2024-45519.json index d0d44f0e65..acdf828ca5 100644 --- a/2024/CVE-2024-45519.json +++ b/2024/CVE-2024-45519.json @@ -76,10 +76,10 @@ "description": "Zimbra - Remote Command Execution (CVE-2024-45519)", "fork": false, "created_at": "2024-10-05T00:15:18Z", - "updated_at": "2024-10-26T05:49:22Z", + "updated_at": "2024-10-27T12:12:42Z", "pushed_at": "2024-10-05T00:18:49Z", - "stargazers_count": 100, - "watchers_count": 100, + "stargazers_count": 101, + "watchers_count": 101, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 16, - "watchers": 100, + "watchers": 101, "score": 0, "subscribers_count": 3 } diff --git a/2024/CVE-2024-4577.json b/2024/CVE-2024-4577.json index 4b09dfe714..5696e9ac20 100644 --- a/2024/CVE-2024-4577.json +++ b/2024/CVE-2024-4577.json @@ -515,7 +515,7 @@ "stargazers_count": 22, "watchers_count": 22, "has_discussions": false, - "forks_count": 8, + "forks_count": 9, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -528,7 +528,7 @@ "redteam" ], "visibility": "public", - "forks": 8, + "forks": 9, "watchers": 22, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-47575.json b/2024/CVE-2024-47575.json index 516b38e270..70c7bfc2d0 100644 --- a/2024/CVE-2024-47575.json +++ b/2024/CVE-2024-47575.json @@ -60,5 +60,36 @@ "watchers": 4, "score": 0, "subscribers_count": 1 + }, + { + "id": 879185083, + "name": "CVE-2024-47575", + "full_name": "Jaden1419\/CVE-2024-47575", + "owner": { + "login": "Jaden1419", + "id": 186391854, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186391854?v=4", + "html_url": "https:\/\/github.com\/Jaden1419", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Jaden1419\/CVE-2024-47575", + "description": null, + "fork": false, + "created_at": "2024-10-27T08:24:35Z", + "updated_at": "2024-10-27T09:56:39Z", + "pushed_at": "2024-10-27T09:30:44Z", + "stargazers_count": 2, + "watchers_count": 2, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 2, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-48569.json b/2024/CVE-2024-48569.json new file mode 100644 index 0000000000..f5334a6c87 --- /dev/null +++ b/2024/CVE-2024-48569.json @@ -0,0 +1,33 @@ +[ + { + "id": 879186454, + "name": "CVE-2024-48569", + "full_name": "MarioTesoro\/CVE-2024-48569", + "owner": { + "login": "MarioTesoro", + "id": 62204045, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62204045?v=4", + "html_url": "https:\/\/github.com\/MarioTesoro", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/MarioTesoro\/CVE-2024-48569", + "description": "Proof of concept of multiple Stored Cross-Site Scripting (XSS) vulnerabilities discovered in ACI Worldwide Proactive Risk Manager v 9.1.1.0", + "fork": false, + "created_at": "2024-10-27T08:29:59Z", + "updated_at": "2024-10-27T09:03:10Z", + "pushed_at": "2024-10-27T09:00:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-48904.json b/2024/CVE-2024-48904.json new file mode 100644 index 0000000000..7555cc2bc8 --- /dev/null +++ b/2024/CVE-2024-48904.json @@ -0,0 +1,33 @@ +[ + { + "id": 879184940, + "name": "CVE-2024-48904", + "full_name": "zetraxz\/CVE-2024-48904", + "owner": { + "login": "zetraxz", + "id": 186395163, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186395163?v=4", + "html_url": "https:\/\/github.com\/zetraxz", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/zetraxz\/CVE-2024-48904", + "description": null, + "fork": false, + "created_at": "2024-10-27T08:24:03Z", + "updated_at": "2024-10-27T10:15:09Z", + "pushed_at": "2024-10-27T10:14:49Z", + "stargazers_count": 2, + "watchers_count": 2, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 2, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-6778.json b/2024/CVE-2024-6778.json index c95ca8412f..08e5fb3aa6 100644 --- a/2024/CVE-2024-6778.json +++ b/2024/CVE-2024-6778.json @@ -14,19 +14,19 @@ "description": "A POC exploit for CVE-2024-5836 and CVE-2024-6778, allowing for a sandbox escape from a Chrome extension. ", "fork": false, "created_at": "2024-09-10T06:27:59Z", - "updated_at": "2024-10-27T03:56:31Z", + "updated_at": "2024-10-27T12:17:08Z", "pushed_at": "2024-10-17T05:12:29Z", - "stargazers_count": 74, - "watchers_count": 74, + "stargazers_count": 76, + "watchers_count": 76, "has_discussions": false, - "forks_count": 11, + "forks_count": 12, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 11, - "watchers": 74, + "forks": 12, + "watchers": 76, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-9264.json b/2024/CVE-2024-9264.json index 9e1ce51a84..674956ad39 100644 --- a/2024/CVE-2024-9264.json +++ b/2024/CVE-2024-9264.json @@ -129,7 +129,7 @@ "stargazers_count": 8, "watchers_count": 8, "has_discussions": false, - "forks_count": 3, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -142,7 +142,7 @@ "shellfs" ], "visibility": "public", - "forks": 3, + "forks": 4, "watchers": 8, "score": 0, "subscribers_count": 1 diff --git a/README.md b/README.md index ba91537331..8c959f5c04 100644 --- a/README.md +++ b/README.md @@ -62,6 +62,13 @@ - [nidhihcl75/frameworks_av_AOSP10_r33_CVE-2024-0049](https://github.com/nidhihcl75/frameworks_av_AOSP10_r33_CVE-2024-0049) - [Aakashmom/frameworks_av_android10_r33_CVE-2024-0049](https://github.com/Aakashmom/frameworks_av_android10_r33_CVE-2024-0049) +### CVE-2024-0113 (2024-08-09) + +NVIDIA Mellanox OS, ONYX, Skyway, and MetroX-3 XCC contain a vulnerability in the web support, where an attacker can cause a CGI path traversal by a specially crafted URI. A successful exploit of this vulnerability might lead to escalation of privileges and information disclosure. + + +- [zetraxz/CVE-2024-0113](https://github.com/zetraxz/CVE-2024-0113) + ### CVE-2024-0195 (2024-01-02) Es wurde eine Schwachstelle in spider-flow 0.4.3 gefunden. Sie wurde als kritisch eingestuft. Es betrifft die Funktion FunctionService.saveFunction der Datei src/main/java/org/spiderflow/controller/FunctionController.java. Durch Manipulieren mit unbekannten Daten kann eine code injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung. @@ -2271,6 +2278,7 @@ - [maybelookis/CVE-2024-23113](https://github.com/maybelookis/CVE-2024-23113) - [p33d/CVE-2024-23113](https://github.com/p33d/CVE-2024-23113) - [groshi/CVE-2024-23113-Private-POC](https://github.com/groshi/CVE-2024-23113-Private-POC) +- [Jaden1419/CVE-2024-23113](https://github.com/Jaden1419/CVE-2024-23113) ### CVE-2024-23208 (2024-01-23) @@ -3425,6 +3433,7 @@ - [horizon3ai/CVE-2024-28987](https://github.com/horizon3ai/CVE-2024-28987) - [PlayerFridei/CVE-2024-28987](https://github.com/PlayerFridei/CVE-2024-28987) - [HazeLook/CVE-2024-28987](https://github.com/HazeLook/CVE-2024-28987) +- [Jaden1419/CVE-2024-28987](https://github.com/Jaden1419/CVE-2024-28987) ### CVE-2024-28995 (2024-06-06) @@ -5320,6 +5329,7 @@ ### CVE-2024-43532 - [HazeLook/CVE-2024-43532](https://github.com/HazeLook/CVE-2024-43532) +- [Jaden1419/CVE-2024-43532](https://github.com/Jaden1419/CVE-2024-43532) ### CVE-2024-43582 - [jinxongwi/CVE-2024-43582-RCE](https://github.com/jinxongwi/CVE-2024-43582-RCE) @@ -5601,6 +5611,7 @@ ### CVE-2024-47575 - [maybelookis/CVE-2024-47575](https://github.com/maybelookis/CVE-2024-47575) - [HazeLook/CVE-2024-47575](https://github.com/HazeLook/CVE-2024-47575) +- [Jaden1419/CVE-2024-47575](https://github.com/Jaden1419/CVE-2024-47575) ### CVE-2024-47854 - [MarioTesoro/CVE-2024-47854](https://github.com/MarioTesoro/CVE-2024-47854) @@ -5617,6 +5628,9 @@ ### CVE-2024-48427 - [vighneshnair7/CVE-2024-48427](https://github.com/vighneshnair7/CVE-2024-48427) +### CVE-2024-48569 +- [MarioTesoro/CVE-2024-48569](https://github.com/MarioTesoro/CVE-2024-48569) + ### CVE-2024-48605 - [surajhacx/HelakuruV.1.1-DLLHijack](https://github.com/surajhacx/HelakuruV.1.1-DLLHijack) @@ -5626,6 +5640,9 @@ ### CVE-2024-48652 - [paragbagul111/CVE-2024-48652](https://github.com/paragbagul111/CVE-2024-48652) +### CVE-2024-48904 +- [zetraxz/CVE-2024-48904](https://github.com/zetraxz/CVE-2024-48904) + ### CVE-2024-48914 - [EQSTLab/CVE-2024-48914](https://github.com/EQSTLab/CVE-2024-48914)