diff --git a/2016/CVE-2016-6210.json b/2016/CVE-2016-6210.json index 7607f9afee..5f1ceabe95 100644 --- a/2016/CVE-2016-6210.json +++ b/2016/CVE-2016-6210.json @@ -45,10 +45,10 @@ "description": "Custom exploit written for enumerating usernames as per CVE-2016-6210", "fork": false, "created_at": "2023-03-19T19:16:36Z", - "updated_at": "2023-03-20T10:05:04Z", + "updated_at": "2024-11-27T22:45:03Z", "pushed_at": "2024-03-23T16:12:12Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 }, diff --git a/2019/CVE-2019-18634.json b/2019/CVE-2019-18634.json index 9505f30cd9..1d747ecbc4 100644 --- a/2019/CVE-2019-18634.json +++ b/2019/CVE-2019-18634.json @@ -45,10 +45,10 @@ "description": "Proof of Concept for CVE-2019-18634", "fork": false, "created_at": "2020-02-07T18:07:03Z", - "updated_at": "2024-11-12T12:05:13Z", + "updated_at": "2024-11-27T21:33:37Z", "pushed_at": "2021-09-12T02:55:24Z", - "stargazers_count": 208, - "watchers_count": 208, + "stargazers_count": 209, + "watchers_count": 209, "has_discussions": false, "forks_count": 44, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 44, - "watchers": 208, + "watchers": 209, "score": 0, "subscribers_count": 3 }, diff --git a/2021/CVE-2021-3490.json b/2021/CVE-2021-3490.json index 41ab76b079..247b96f4a8 100644 --- a/2021/CVE-2021-3490.json +++ b/2021/CVE-2021-3490.json @@ -90,6 +90,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2021/CVE-2021-3560.json b/2021/CVE-2021-3560.json index ddcb643d26..7492605a22 100644 --- a/2021/CVE-2021-3560.json +++ b/2021/CVE-2021-3560.json @@ -395,10 +395,10 @@ "description": "CVE-2021-3560 analysis", "fork": false, "created_at": "2022-01-31T09:02:23Z", - "updated_at": "2023-03-05T11:58:45Z", + "updated_at": "2024-11-27T19:11:24Z", "pushed_at": "2022-05-23T02:23:38Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -407,7 +407,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 7, + "watchers": 8, "score": 0, "subscribers_count": 2 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 57f083e7b4..a7e4b0fabd 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -3891,7 +3891,7 @@ "forks": 4, "watchers": 1, "score": 0, - "subscribers_count": 41 + "subscribers_count": 40 }, { "id": 437774679, diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index 8e1a67249f..8f876db710 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -293,10 +293,10 @@ "description": "Linux Kernel Local Privilege Escalation Vulnerability CVE-2022-0847.", "fork": false, "created_at": "2022-03-08T09:10:51Z", - "updated_at": "2024-09-19T01:51:18Z", + "updated_at": "2024-11-27T21:12:32Z", "pushed_at": "2022-03-08T09:14:25Z", - "stargazers_count": 59, - "watchers_count": 59, + "stargazers_count": 58, + "watchers_count": 58, "has_discussions": false, "forks_count": 21, "allow_forking": true, @@ -305,7 +305,7 @@ "topics": [], "visibility": "public", "forks": 21, - "watchers": 59, + "watchers": 58, "score": 0, "subscribers_count": 5 }, diff --git a/2022/CVE-2022-22274.json b/2022/CVE-2022-22274.json index 199fcfbf2e..4548adc86a 100644 --- a/2022/CVE-2022-22274.json +++ b/2022/CVE-2022-22274.json @@ -76,10 +76,10 @@ "description": null, "fork": false, "created_at": "2024-01-12T20:03:51Z", - "updated_at": "2024-07-09T02:15:06Z", + "updated_at": "2024-11-28T00:21:37Z", "pushed_at": "2024-01-12T20:15:47Z", - "stargazers_count": 18, - "watchers_count": 18, + "stargazers_count": 19, + "watchers_count": 19, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 18, + "watchers": 19, "score": 0, "subscribers_count": 5 } diff --git a/2022/CVE-2022-38694.json b/2022/CVE-2022-38694.json index 32646b8ae7..c7ccf48285 100644 --- a/2022/CVE-2022-38694.json +++ b/2022/CVE-2022-38694.json @@ -14,10 +14,10 @@ "description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692", "fork": false, "created_at": "2023-06-10T08:31:26Z", - "updated_at": "2024-11-27T10:51:18Z", + "updated_at": "2024-11-27T23:22:53Z", "pushed_at": "2024-08-01T15:09:15Z", - "stargazers_count": 297, - "watchers_count": 297, + "stargazers_count": 298, + "watchers_count": 298, "has_discussions": true, "forks_count": 44, "allow_forking": true, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 44, - "watchers": 297, + "watchers": 298, "score": 0, "subscribers_count": 7 }, diff --git a/2022/CVE-2022-46689.json b/2022/CVE-2022-46689.json index b0c37c160e..df8c40eb67 100644 --- a/2022/CVE-2022-46689.json +++ b/2022/CVE-2022-46689.json @@ -14,10 +14,10 @@ "description": "Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.", "fork": false, "created_at": "2022-12-17T16:45:24Z", - "updated_at": "2024-11-09T11:43:25Z", + "updated_at": "2024-11-27T21:45:01Z", "pushed_at": "2022-12-21T17:53:19Z", - "stargazers_count": 392, - "watchers_count": 392, + "stargazers_count": 393, + "watchers_count": 393, "has_discussions": false, "forks_count": 33, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 33, - "watchers": 392, + "watchers": 393, "score": 0, "subscribers_count": 11 }, diff --git a/2023/CVE-2023-0656.json b/2023/CVE-2023-0656.json index a7bf494a6f..94f55c95e4 100644 --- a/2023/CVE-2023-0656.json +++ b/2023/CVE-2023-0656.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2024-01-12T20:03:51Z", - "updated_at": "2024-07-09T02:15:06Z", + "updated_at": "2024-11-28T00:21:37Z", "pushed_at": "2024-01-12T20:15:47Z", - "stargazers_count": 18, - "watchers_count": 18, + "stargazers_count": 19, + "watchers_count": 19, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 18, + "watchers": 19, "score": 0, "subscribers_count": 5 } diff --git a/2023/CVE-2023-32428.json b/2023/CVE-2023-32428.json index 683deace19..78348b1c48 100644 --- a/2023/CVE-2023-32428.json +++ b/2023/CVE-2023-32428.json @@ -14,19 +14,19 @@ "description": null, "fork": false, "created_at": "2024-11-26T07:52:29Z", - "updated_at": "2024-11-27T16:44:47Z", + "updated_at": "2024-11-27T23:36:42Z", "pushed_at": "2024-11-26T08:06:06Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "has_discussions": false, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, - "watchers": 8, + "forks": 2, + "watchers": 9, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-50164.json b/2023/CVE-2023-50164.json index 5f17adba33..233710108a 100644 --- a/2023/CVE-2023-50164.json +++ b/2023/CVE-2023-50164.json @@ -45,10 +45,10 @@ "description": "A critical security vulnerability, identified as CVE-2023-50164 (CVE: 9.8) was found in Apache Struts, allowing attackers to manipulate file upload parameters that can potentially lead to unauthorized path traversal and remote code execution (RCE).", "fork": false, "created_at": "2023-12-13T09:31:36Z", - "updated_at": "2024-11-04T19:19:56Z", + "updated_at": "2024-11-27T21:19:08Z", "pushed_at": "2024-08-30T06:37:53Z", - "stargazers_count": 80, - "watchers_count": 80, + "stargazers_count": 81, + "watchers_count": 81, "has_discussions": false, "forks_count": 21, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 21, - "watchers": 80, + "watchers": 81, "score": 0, "subscribers_count": 4 }, diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json index 2990e1ed9b..545bbe8c9a 100644 --- a/2024/CVE-2024-1086.json +++ b/2024/CVE-2024-1086.json @@ -14,10 +14,10 @@ "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.", "fork": false, "created_at": "2024-03-20T21:16:41Z", - "updated_at": "2024-11-26T17:02:25Z", + "updated_at": "2024-11-27T18:47:19Z", "pushed_at": "2024-04-17T16:09:54Z", - "stargazers_count": 2286, - "watchers_count": 2286, + "stargazers_count": 2285, + "watchers_count": 2285, "has_discussions": false, "forks_count": 298, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 298, - "watchers": 2286, + "watchers": 2285, "score": 0, "subscribers_count": 24 }, diff --git a/2024/CVE-2024-10914.json b/2024/CVE-2024-10914.json index 087c8f33d1..57bff100a1 100644 --- a/2024/CVE-2024-10914.json +++ b/2024/CVE-2024-10914.json @@ -161,5 +161,74 @@ "watchers": 1, "score": 0, "subscribers_count": 1 + }, + { + "id": 895213023, + "name": "cve-2024-10914-port", + "full_name": "retuci0\/cve-2024-10914-port", + "owner": { + "login": "retuci0", + "id": 165311393, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/165311393?v=4", + "html_url": "https:\/\/github.com\/retuci0", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/retuci0\/cve-2024-10914-port", + "description": "dlink vulnerability thing in python and rust", + "fork": false, + "created_at": "2024-11-27T19:11:55Z", + "updated_at": "2024-11-27T19:12:49Z", + "pushed_at": "2024-11-27T19:12:45Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + }, + { + "id": 895284938, + "name": "CVE-2024-10914-EXPLOIT", + "full_name": "K3ysTr0K3R\/CVE-2024-10914-EXPLOIT", + "owner": { + "login": "K3ysTr0K3R", + "id": 70909693, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4", + "html_url": "https:\/\/github.com\/K3ysTr0K3R", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2024-10914-EXPLOIT", + "description": "A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE)", + "fork": false, + "created_at": "2024-11-27T23:10:20Z", + "updated_at": "2024-11-27T23:33:14Z", + "pushed_at": "2024-11-27T23:31:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "cve-2024-10914", + "ethical-hacking", + "exploit", + "exploitation", + "hacking", + "proof-of-concept" + ], + "visibility": "public", + "forks": 1, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-11680.json b/2024/CVE-2024-11680.json index 044dab938d..76c29fbe4f 100644 --- a/2024/CVE-2024-11680.json +++ b/2024/CVE-2024-11680.json @@ -29,5 +29,36 @@ "watchers": 2, "score": 0, "subscribers_count": 0 + }, + { + "id": 895217936, + "name": "CVE-2024-11680", + "full_name": "exploitboom\/CVE-2024-11680", + "owner": { + "login": "exploitboom", + "id": 189791933, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/189791933?v=4", + "html_url": "https:\/\/github.com\/exploitboom", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/exploitboom\/CVE-2024-11680", + "description": null, + "fork": false, + "created_at": "2024-11-27T19:25:17Z", + "updated_at": "2024-11-27T19:27:10Z", + "pushed_at": "2024-11-27T19:26:01Z", + "stargazers_count": 3, + "watchers_count": 3, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 3, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-20356.json b/2024/CVE-2024-20356.json index 87a45f18d5..460576424c 100644 --- a/2024/CVE-2024-20356.json +++ b/2024/CVE-2024-20356.json @@ -14,10 +14,10 @@ "description": "This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.", "fork": false, "created_at": "2024-04-12T15:07:42Z", - "updated_at": "2024-11-27T11:48:24Z", + "updated_at": "2024-11-27T20:52:39Z", "pushed_at": "2024-04-18T14:31:34Z", - "stargazers_count": 53, - "watchers_count": 53, + "stargazers_count": 54, + "watchers_count": 54, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 11, - "watchers": 53, + "watchers": 54, "score": 0, "subscribers_count": 7 }, diff --git a/2024/CVE-2024-23897.json b/2024/CVE-2024-23897.json index 8e5cd7ac0e..1ae7deaae0 100644 --- a/2024/CVE-2024-23897.json +++ b/2024/CVE-2024-23897.json @@ -76,10 +76,10 @@ "description": "CVE-2024-23897", "fork": false, "created_at": "2024-01-26T09:44:32Z", - "updated_at": "2024-11-16T07:32:20Z", + "updated_at": "2024-11-27T22:38:24Z", "pushed_at": "2024-01-28T06:47:28Z", - "stargazers_count": 193, - "watchers_count": 193, + "stargazers_count": 194, + "watchers_count": 194, "has_discussions": false, "forks_count": 36, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 36, - "watchers": 193, + "watchers": 194, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-25600.json b/2024/CVE-2024-25600.json index 67825a7cba..b6395cf4b1 100644 --- a/2024/CVE-2024-25600.json +++ b/2024/CVE-2024-25600.json @@ -19,13 +19,13 @@ "stargazers_count": 149, "watchers_count": 149, "has_discussions": false, - "forks_count": 32, + "forks_count": 33, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 32, + "forks": 33, "watchers": 149, "score": 0, "subscribers_count": 3 diff --git a/2024/CVE-2024-30088.json b/2024/CVE-2024-30088.json index 2f79c05298..751bbf6d25 100644 --- a/2024/CVE-2024-30088.json +++ b/2024/CVE-2024-30088.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2024-06-24T10:37:26Z", - "updated_at": "2024-11-22T09:17:50Z", + "updated_at": "2024-11-27T22:51:52Z", "pushed_at": "2024-07-31T19:11:55Z", - "stargazers_count": 237, - "watchers_count": 237, + "stargazers_count": 238, + "watchers_count": 238, "has_discussions": false, "forks_count": 53, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 53, - "watchers": 237, + "watchers": 238, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-34102.json b/2024/CVE-2024-34102.json index 2d33be8a5a..bf28e54799 100644 --- a/2024/CVE-2024-34102.json +++ b/2024/CVE-2024-34102.json @@ -81,13 +81,13 @@ "stargazers_count": 28, "watchers_count": 28, "has_discussions": false, - "forks_count": 10, + "forks_count": 9, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 10, + "forks": 9, "watchers": 28, "score": 0, "subscribers_count": 2 @@ -174,13 +174,13 @@ "stargazers_count": 40, "watchers_count": 40, "has_discussions": false, - "forks_count": 11, + "forks_count": 10, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 11, + "forks": 10, "watchers": 40, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-36401.json b/2024/CVE-2024-36401.json index a281efc00f..a18b104578 100644 --- a/2024/CVE-2024-36401.json +++ b/2024/CVE-2024-36401.json @@ -470,5 +470,36 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 895213731, + "name": "CVE-2024-36401", + "full_name": "0x0d3ad\/CVE-2024-36401", + "owner": { + "login": "0x0d3ad", + "id": 18898977, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18898977?v=4", + "html_url": "https:\/\/github.com\/0x0d3ad", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/0x0d3ad\/CVE-2024-36401", + "description": "CVE-2024-36401 GeoServer Remote Code Execution", + "fork": false, + "created_at": "2024-11-27T19:13:49Z", + "updated_at": "2024-11-28T00:22:12Z", + "pushed_at": "2024-11-27T19:20:14Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-44258.json b/2024/CVE-2024-44258.json index 7da98c7e2f..4e305e73df 100644 --- a/2024/CVE-2024-44258.json +++ b/2024/CVE-2024-44258.json @@ -14,10 +14,10 @@ "description": "CVE-2024-44258", "fork": false, "created_at": "2024-10-29T09:45:03Z", - "updated_at": "2024-11-24T19:28:06Z", + "updated_at": "2024-11-27T20:00:28Z", "pushed_at": "2024-11-02T19:20:44Z", - "stargazers_count": 57, - "watchers_count": 57, + "stargazers_count": 58, + "watchers_count": 58, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 57, + "watchers": 58, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-47575.json b/2024/CVE-2024-47575.json index b085a6be81..738232d93b 100644 --- a/2024/CVE-2024-47575.json +++ b/2024/CVE-2024-47575.json @@ -14,10 +14,10 @@ "description": "Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575", "fork": false, "created_at": "2024-11-07T21:03:30Z", - "updated_at": "2024-11-27T15:44:48Z", + "updated_at": "2024-11-27T19:14:30Z", "pushed_at": "2024-11-14T16:25:52Z", - "stargazers_count": 68, - "watchers_count": 68, + "stargazers_count": 69, + "watchers_count": 69, "has_discussions": false, "forks_count": 22, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 22, - "watchers": 68, + "watchers": 69, "score": 0, "subscribers_count": 0 }, diff --git a/2024/CVE-2024-48336.json b/2024/CVE-2024-48336.json index f1c8d9de06..ad4ee30d7c 100644 --- a/2024/CVE-2024-48336.json +++ b/2024/CVE-2024-48336.json @@ -19,13 +19,13 @@ "stargazers_count": 174, "watchers_count": 174, "has_discussions": false, - "forks_count": 30, + "forks_count": 29, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 30, + "forks": 29, "watchers": 174, "score": 0, "subscribers_count": 8 diff --git a/2024/CVE-2024-48990.json b/2024/CVE-2024-48990.json index 36badecd99..6e93cdf986 100644 --- a/2024/CVE-2024-48990.json +++ b/2024/CVE-2024-48990.json @@ -138,10 +138,10 @@ "description": "Testing POC for use cases", "fork": false, "created_at": "2024-11-24T07:33:06Z", - "updated_at": "2024-11-26T14:05:02Z", + "updated_at": "2024-11-27T22:55:46Z", "pushed_at": "2024-11-24T07:56:49Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -150,7 +150,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 6, + "watchers": 7, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-6387.json b/2024/CVE-2024-6387.json index 919248e935..3307617ba0 100644 --- a/2024/CVE-2024-6387.json +++ b/2024/CVE-2024-6387.json @@ -14,10 +14,10 @@ "description": "a signal handler race condition in OpenSSH's server (sshd)", "fork": false, "created_at": "2024-07-01T10:55:29Z", - "updated_at": "2024-11-26T03:27:29Z", + "updated_at": "2024-11-28T00:20:21Z", "pushed_at": "2024-07-01T10:54:02Z", - "stargazers_count": 464, - "watchers_count": 464, + "stargazers_count": 465, + "watchers_count": 465, "has_discussions": false, "forks_count": 182, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 182, - "watchers": 464, + "watchers": 465, "score": 0, "subscribers_count": 5 }, diff --git a/README.md b/README.md index 321ec6ff6f..ac1777d4bc 100644 --- a/README.md +++ b/README.md @@ -2112,6 +2112,8 @@ - [Egi08/CVE-2024-10914](https://github.com/Egi08/CVE-2024-10914) - [Bu0uCat/D-Link-NAS-CVE-2024-10914-](https://github.com/Bu0uCat/D-Link-NAS-CVE-2024-10914-) - [ThemeHackers/CVE-2024-10914](https://github.com/ThemeHackers/CVE-2024-10914) +- [retuci0/cve-2024-10914-port](https://github.com/retuci0/cve-2024-10914-port) +- [K3ysTr0K3R/CVE-2024-10914-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2024-10914-EXPLOIT) ### CVE-2024-10924 (2024-11-15) @@ -2205,6 +2207,7 @@ - [famixcm/CVE-2024-11680](https://github.com/famixcm/CVE-2024-11680) +- [exploitboom/CVE-2024-11680](https://github.com/exploitboom/CVE-2024-11680) ### CVE-2024-12883 - [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883) @@ -5120,6 +5123,7 @@ - [kkhackz0013/CVE-2024-36401](https://github.com/kkhackz0013/CVE-2024-36401) - [thestar0/CVE-2024-36401-WoodpeckerPlugin](https://github.com/thestar0/CVE-2024-36401-WoodpeckerPlugin) - [XiaomingX/cve-2024-36401-poc](https://github.com/XiaomingX/cve-2024-36401-poc) +- [0x0d3ad/CVE-2024-36401](https://github.com/0x0d3ad/CVE-2024-36401) ### CVE-2024-36416 (2024-06-10)