diff --git a/2008/CVE-2008-0166.json b/2008/CVE-2008-0166.json
index f6c16c0fcb..639df26221 100644
--- a/2008/CVE-2008-0166.json
+++ b/2008/CVE-2008-0166.json
@@ -78,10 +78,10 @@
"description": "Private keys vulnerable to Debian OpenSSL bug (CVE-2008-0166)",
"fork": false,
"created_at": "2022-05-15T10:28:03Z",
- "updated_at": "2024-10-13T05:42:15Z",
+ "updated_at": "2025-01-21T21:45:18Z",
"pushed_at": "2024-05-18T14:17:24Z",
- "stargazers_count": 3,
- "watchers_count": 3,
+ "stargazers_count": 4,
+ "watchers_count": 4,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@@ -90,7 +90,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
- "watchers": 3,
+ "watchers": 4,
"score": 0,
"subscribers_count": 2
},
diff --git a/2016/CVE-2016-4622.json b/2016/CVE-2016-4622.json
index c1124e931a..04aa637189 100644
--- a/2016/CVE-2016-4622.json
+++ b/2016/CVE-2016-4622.json
@@ -48,7 +48,7 @@
"description": "My journey through WebKit CVE-2016-4622 Exploitation process",
"fork": false,
"created_at": "2020-04-07T00:46:19Z",
- "updated_at": "2024-08-25T14:04:31Z",
+ "updated_at": "2025-01-21T22:11:02Z",
"pushed_at": "2020-04-12T19:46:40Z",
"stargazers_count": 21,
"watchers_count": 21,
diff --git a/2018/CVE-2018-6242.json b/2018/CVE-2018-6242.json
index c52f4d3029..adc84df573 100644
--- a/2018/CVE-2018-6242.json
+++ b/2018/CVE-2018-6242.json
@@ -14,10 +14,10 @@
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
"fork": false,
"created_at": "2018-04-28T11:50:00Z",
- "updated_at": "2025-01-18T01:48:29Z",
+ "updated_at": "2025-01-21T23:37:51Z",
"pushed_at": "2022-12-11T10:44:39Z",
- "stargazers_count": 527,
- "watchers_count": 527,
+ "stargazers_count": 528,
+ "watchers_count": 528,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 52,
- "watchers": 527,
+ "watchers": 528,
"score": 0,
"subscribers_count": 55
},
diff --git a/2019/CVE-2019-11043.json b/2019/CVE-2019-11043.json
index ec3120fa91..35613efe4e 100644
--- a/2019/CVE-2019-11043.json
+++ b/2019/CVE-2019-11043.json
@@ -14,7 +14,7 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
- "updated_at": "2025-01-17T06:23:10Z",
+ "updated_at": "2025-01-21T20:48:30Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1802,
"watchers_count": 1802,
@@ -267,13 +267,13 @@
"stargazers_count": 144,
"watchers_count": 144,
"has_discussions": false,
- "forks_count": 45,
+ "forks_count": 43,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 45,
+ "forks": 43,
"watchers": 144,
"score": 0,
"subscribers_count": 9
diff --git a/2019/CVE-2019-19781.json b/2019/CVE-2019-19781.json
index 0884e69845..ff0482ebca 100644
--- a/2019/CVE-2019-19781.json
+++ b/2019/CVE-2019-19781.json
@@ -45,7 +45,7 @@
"description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.",
"fork": false,
"created_at": "2020-01-11T00:08:27Z",
- "updated_at": "2024-12-22T14:00:19Z",
+ "updated_at": "2025-01-21T22:11:01Z",
"pushed_at": "2020-01-22T20:23:51Z",
"stargazers_count": 572,
"watchers_count": 572,
@@ -177,10 +177,10 @@
"description": "CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit",
"fork": false,
"created_at": "2020-01-11T09:49:17Z",
- "updated_at": "2024-12-06T23:51:10Z",
+ "updated_at": "2025-01-21T22:11:01Z",
"pushed_at": "2021-01-24T20:18:04Z",
- "stargazers_count": 156,
- "watchers_count": 156,
+ "stargazers_count": 155,
+ "watchers_count": 155,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@@ -189,7 +189,7 @@
"topics": [],
"visibility": "public",
"forks": 38,
- "watchers": 156,
+ "watchers": 155,
"score": 0,
"subscribers_count": 4
},
diff --git a/2019/CVE-2019-6207.json b/2019/CVE-2019-6207.json
index fb83ecef1f..063f978550 100644
--- a/2019/CVE-2019-6207.json
+++ b/2019/CVE-2019-6207.json
@@ -76,7 +76,7 @@
"description": "MacOS kernel memory leak (4 bytes)",
"fork": false,
"created_at": "2020-04-10T14:30:16Z",
- "updated_at": "2024-08-15T03:57:59Z",
+ "updated_at": "2025-01-21T22:11:02Z",
"pushed_at": "2020-04-14T06:57:49Z",
"stargazers_count": 29,
"watchers_count": 29,
diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json
index dc961b3d4a..d186c7da7f 100644
--- a/2020/CVE-2020-1472.json
+++ b/2020/CVE-2020-1472.json
@@ -107,10 +107,10 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
- "updated_at": "2025-01-16T03:08:57Z",
+ "updated_at": "2025-01-21T20:25:14Z",
"pushed_at": "2020-11-03T09:45:24Z",
- "stargazers_count": 1204,
- "watchers_count": 1204,
+ "stargazers_count": 1205,
+ "watchers_count": 1205,
"has_discussions": false,
"forks_count": 283,
"allow_forking": true,
@@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 283,
- "watchers": 1204,
+ "watchers": 1205,
"score": 0,
"subscribers_count": 34
},
diff --git a/2020/CVE-2020-5398.json b/2020/CVE-2020-5398.json
index f81468d6de..df887991bb 100644
--- a/2020/CVE-2020-5398.json
+++ b/2020/CVE-2020-5398.json
@@ -14,10 +14,10 @@
"description": "CVE-2020-5398 - RFD(Reflected File Download) Attack for Spring MVC",
"fork": false,
"created_at": "2020-01-17T05:35:01Z",
- "updated_at": "2024-12-03T10:19:36Z",
+ "updated_at": "2025-01-21T23:20:59Z",
"pushed_at": "2022-12-15T07:33:15Z",
- "stargazers_count": 85,
- "watchers_count": 85,
+ "stargazers_count": 86,
+ "watchers_count": 86,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
- "watchers": 85,
+ "watchers": 86,
"score": 0,
"subscribers_count": 2
}
diff --git a/2021/CVE-2021-30807.json b/2021/CVE-2021-30807.json
index c550c54d00..90b9c6bcaf 100644
--- a/2021/CVE-2021-30807.json
+++ b/2021/CVE-2021-30807.json
@@ -14,7 +14,7 @@
"description": "Exploit for CVE-2021-30807",
"fork": false,
"created_at": "2021-10-09T20:11:42Z",
- "updated_at": "2024-11-10T14:44:04Z",
+ "updated_at": "2025-01-21T22:11:09Z",
"pushed_at": "2021-11-29T13:50:42Z",
"stargazers_count": 130,
"watchers_count": 130,
diff --git a/2021/CVE-2021-30860.json b/2021/CVE-2021-30860.json
index 55c07094a6..5fa555add3 100644
--- a/2021/CVE-2021-30860.json
+++ b/2021/CVE-2021-30860.json
@@ -45,7 +45,7 @@
"description": "Collection of materials relating to FORCEDENTRY",
"fork": false,
"created_at": "2021-12-25T03:00:01Z",
- "updated_at": "2025-01-02T21:48:11Z",
+ "updated_at": "2025-01-21T22:11:11Z",
"pushed_at": "2024-03-30T22:17:05Z",
"stargazers_count": 95,
"watchers_count": 95,
diff --git a/2021/CVE-2021-30955.json b/2021/CVE-2021-30955.json
index 0fda0a3b07..efbc9ace15 100644
--- a/2021/CVE-2021-30955.json
+++ b/2021/CVE-2021-30955.json
@@ -107,7 +107,7 @@
"description": "iOS 15.1 kernel exploit POC for CVE-2021-30955",
"fork": false,
"created_at": "2022-03-01T12:41:03Z",
- "updated_at": "2024-11-16T08:09:19Z",
+ "updated_at": "2025-01-21T22:11:13Z",
"pushed_at": "2022-03-01T16:11:31Z",
"stargazers_count": 253,
"watchers_count": 253,
diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json
index b0fcc06a17..a5c454aabf 100644
--- a/2021/CVE-2021-3156.json
+++ b/2021/CVE-2021-3156.json
@@ -486,7 +486,7 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
- "updated_at": "2025-01-18T22:40:31Z",
+ "updated_at": "2025-01-21T22:11:06Z",
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 963,
"watchers_count": 963,
diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json
index 91ccf937cd..0f97ad86e6 100644
--- a/2021/CVE-2021-4034.json
+++ b/2021/CVE-2021-4034.json
@@ -1982,7 +1982,7 @@
"description": "Proof of concept for pwnkit vulnerability",
"fork": false,
"created_at": "2022-01-27T14:43:57Z",
- "updated_at": "2024-12-24T08:36:17Z",
+ "updated_at": "2025-01-21T20:48:36Z",
"pushed_at": "2023-01-12T19:23:29Z",
"stargazers_count": 338,
"watchers_count": 338,
diff --git a/2021/CVE-2021-40438.json b/2021/CVE-2021-40438.json
index f4ee31b77b..569a14b69a 100644
--- a/2021/CVE-2021-40438.json
+++ b/2021/CVE-2021-40438.json
@@ -308,8 +308,8 @@
"description": "Check Point Security Gateways RCE via CVE-2021-40438",
"fork": false,
"created_at": "2025-01-21T13:16:24Z",
- "updated_at": "2025-01-21T16:47:39Z",
- "pushed_at": "2025-01-21T16:03:56Z",
+ "updated_at": "2025-01-21T20:17:16Z",
+ "pushed_at": "2025-01-21T20:17:13Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json
index 9acfd017f9..83eea14eba 100644
--- a/2021/CVE-2021-41773.json
+++ b/2021/CVE-2021-41773.json
@@ -461,7 +461,7 @@
"description": "CVE-2021-41773 playground",
"fork": false,
"created_at": "2021-10-06T07:17:05Z",
- "updated_at": "2024-11-22T13:23:13Z",
+ "updated_at": "2025-01-21T22:11:09Z",
"pushed_at": "2021-10-07T17:56:38Z",
"stargazers_count": 206,
"watchers_count": 206,
diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json
index 7c78d1f043..dcc185b1e2 100644
--- a/2021/CVE-2021-44228.json
+++ b/2021/CVE-2021-44228.json
@@ -622,7 +622,7 @@
"description": "Hashes for vulnerable LOG4J versions",
"fork": false,
"created_at": "2021-12-10T18:06:06Z",
- "updated_at": "2025-01-06T02:36:36Z",
+ "updated_at": "2025-01-21T20:35:54Z",
"pushed_at": "2021-12-17T17:02:24Z",
"stargazers_count": 153,
"watchers_count": 153,
@@ -884,10 +884,10 @@
"description": "🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
"fork": false,
"created_at": "2021-12-10T22:35:00Z",
- "updated_at": "2025-01-14T03:16:00Z",
+ "updated_at": "2025-01-21T21:32:29Z",
"pushed_at": "2022-01-15T16:18:44Z",
- "stargazers_count": 935,
- "watchers_count": 935,
+ "stargazers_count": 934,
+ "watchers_count": 934,
"has_discussions": false,
"forks_count": 141,
"allow_forking": true,
@@ -916,7 +916,7 @@
],
"visibility": "public",
"forks": 141,
- "watchers": 935,
+ "watchers": 934,
"score": 0,
"subscribers_count": 25
},
@@ -1467,7 +1467,7 @@
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
"fork": false,
"created_at": "2021-12-11T11:18:46Z",
- "updated_at": "2025-01-19T07:23:11Z",
+ "updated_at": "2025-01-21T20:35:54Z",
"pushed_at": "2022-04-07T14:47:03Z",
"stargazers_count": 854,
"watchers_count": 854,
@@ -2027,7 +2027,7 @@
"description": "A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too! TAG_OS_TOOL, OWNER_KELLY, DC_PUBLIC",
"fork": false,
"created_at": "2021-12-12T00:29:03Z",
- "updated_at": "2025-01-19T18:55:44Z",
+ "updated_at": "2025-01-21T20:48:35Z",
"pushed_at": "2022-03-10T18:44:50Z",
"stargazers_count": 637,
"watchers_count": 637,
@@ -3749,10 +3749,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
- "updated_at": "2025-01-15T07:32:58Z",
+ "updated_at": "2025-01-21T18:27:36Z",
"pushed_at": "2022-11-23T18:23:24Z",
- "stargazers_count": 3408,
- "watchers_count": 3408,
+ "stargazers_count": 3407,
+ "watchers_count": 3407,
"has_discussions": true,
"forks_count": 740,
"allow_forking": true,
@@ -3761,7 +3761,7 @@
"topics": [],
"visibility": "public",
"forks": 740,
- "watchers": 3408,
+ "watchers": 3407,
"score": 0,
"subscribers_count": 55
},
@@ -9580,7 +9580,7 @@
"description": "Ansible detector scanner playbook to verify target Linux hosts using the official Red Hat Log4j detector script RHSB-2021-009 Remote Code Execution - log4j (CVE-2021-44228)",
"fork": false,
"created_at": "2021-12-21T22:14:24Z",
- "updated_at": "2024-07-07T09:47:47Z",
+ "updated_at": "2025-01-21T20:35:55Z",
"pushed_at": "2022-01-10T19:13:04Z",
"stargazers_count": 57,
"watchers_count": 57,
diff --git a/2021/CVE-2021-45046.json b/2021/CVE-2021-45046.json
index 3d170741d5..9d88fbd80f 100644
--- a/2021/CVE-2021-45046.json
+++ b/2021/CVE-2021-45046.json
@@ -141,7 +141,7 @@
"description": "Public testing data. Samples of log4j library versions to help log4j scanners \/ detectors improve their accuracy for detecting CVE-2021-45046 and CVE-2021-44228. TAG_TESTING, OWNER_KEN, DC_PUBLIC",
"fork": false,
"created_at": "2021-12-16T18:12:29Z",
- "updated_at": "2023-09-11T19:22:43Z",
+ "updated_at": "2025-01-21T20:35:54Z",
"pushed_at": "2021-12-30T05:15:54Z",
"stargazers_count": 14,
"watchers_count": 14,
diff --git a/2022/CVE-2022-20409.json b/2022/CVE-2022-20409.json
index 3c0dea17db..a75f008d75 100644
--- a/2022/CVE-2022-20409.json
+++ b/2022/CVE-2022-20409.json
@@ -14,10 +14,10 @@
"description": "Android kernel exploitation for CVE-2022-20409",
"fork": false,
"created_at": "2022-11-21T22:42:50Z",
- "updated_at": "2025-01-21T10:55:22Z",
+ "updated_at": "2025-01-21T23:07:38Z",
"pushed_at": "2024-10-17T16:26:39Z",
- "stargazers_count": 169,
- "watchers_count": 169,
+ "stargazers_count": 170,
+ "watchers_count": 170,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 24,
- "watchers": 169,
+ "watchers": 170,
"score": 0,
"subscribers_count": 5
}
diff --git a/2022/CVE-2022-20421.json b/2022/CVE-2022-20421.json
index d1a4269372..cb73c0d014 100644
--- a/2022/CVE-2022-20421.json
+++ b/2022/CVE-2022-20421.json
@@ -14,7 +14,7 @@
"description": "Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)",
"fork": false,
"created_at": "2023-03-23T10:25:59Z",
- "updated_at": "2025-01-01T14:03:35Z",
+ "updated_at": "2025-01-21T20:48:38Z",
"pushed_at": "2023-05-27T15:39:41Z",
"stargazers_count": 237,
"watchers_count": 237,
diff --git a/2022/CVE-2022-20699.json b/2022/CVE-2022-20699.json
index ec4aaf2a2a..507fbc70d7 100644
--- a/2022/CVE-2022-20699.json
+++ b/2022/CVE-2022-20699.json
@@ -14,10 +14,10 @@
"description": "Cisco Anyconnect VPN unauth RCE (rwx stack)",
"fork": false,
"created_at": "2022-02-07T15:53:21Z",
- "updated_at": "2024-11-26T06:21:11Z",
+ "updated_at": "2025-01-21T20:48:36Z",
"pushed_at": "2022-02-07T15:55:03Z",
- "stargazers_count": 239,
- "watchers_count": 239,
+ "stargazers_count": 238,
+ "watchers_count": 238,
"has_discussions": false,
"forks_count": 43,
"allow_forking": true,
@@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
- "watchers": 239,
+ "watchers": 238,
"score": 0,
"subscribers_count": 12
},
diff --git a/2022/CVE-2022-21907.json b/2022/CVE-2022-21907.json
index 8d77129228..4d9baef570 100644
--- a/2022/CVE-2022-21907.json
+++ b/2022/CVE-2022-21907.json
@@ -96,7 +96,7 @@
"description": "HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907",
"fork": false,
"created_at": "2022-01-17T02:28:50Z",
- "updated_at": "2024-11-02T16:24:21Z",
+ "updated_at": "2025-01-21T20:35:55Z",
"pushed_at": "2022-01-20T02:07:59Z",
"stargazers_count": 361,
"watchers_count": 361,
diff --git a/2022/CVE-2022-23131.json b/2022/CVE-2022-23131.json
index 1b6d72961a..1aad6e8f52 100644
--- a/2022/CVE-2022-23131.json
+++ b/2022/CVE-2022-23131.json
@@ -76,10 +76,10 @@
"description": "cve-2022-23131 zabbix-saml-bypass-exp",
"fork": false,
"created_at": "2022-02-18T11:51:47Z",
- "updated_at": "2025-01-04T08:11:13Z",
+ "updated_at": "2025-01-21T23:15:09Z",
"pushed_at": "2024-08-11T18:14:56Z",
- "stargazers_count": 150,
- "watchers_count": 150,
+ "stargazers_count": 151,
+ "watchers_count": 151,
"has_discussions": false,
"forks_count": 48,
"allow_forking": true,
@@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 48,
- "watchers": 150,
+ "watchers": 151,
"score": 0,
"subscribers_count": 2
},
diff --git a/2022/CVE-2022-34918.json b/2022/CVE-2022-34918.json
index 8e1b757bbf..6381496860 100644
--- a/2022/CVE-2022-34918.json
+++ b/2022/CVE-2022-34918.json
@@ -14,7 +14,7 @@
"description": null,
"fork": false,
"created_at": "2022-07-19T12:46:45Z",
- "updated_at": "2025-01-16T01:30:59Z",
+ "updated_at": "2025-01-21T22:11:14Z",
"pushed_at": "2022-09-06T14:05:22Z",
"stargazers_count": 243,
"watchers_count": 243,
diff --git a/2022/CVE-2022-38694.json b/2022/CVE-2022-38694.json
index 06f5a7a727..78332dc4ea 100644
--- a/2022/CVE-2022-38694.json
+++ b/2022/CVE-2022-38694.json
@@ -48,10 +48,10 @@
"description": "Bootloader unlock using CVE-2022-38694 for Anbernic Unisoc T820 devices",
"fork": false,
"created_at": "2024-06-27T14:28:13Z",
- "updated_at": "2024-12-10T09:48:51Z",
+ "updated_at": "2025-01-22T00:15:23Z",
"pushed_at": "2024-10-15T10:16:57Z",
- "stargazers_count": 28,
- "watchers_count": 28,
+ "stargazers_count": 29,
+ "watchers_count": 29,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -60,7 +60,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 28,
+ "watchers": 29,
"score": 0,
"subscribers_count": 3
}
diff --git a/2022/CVE-2022-40684.json b/2022/CVE-2022-40684.json
index 412319aa35..8cbdaaa9ff 100644
--- a/2022/CVE-2022-40684.json
+++ b/2022/CVE-2022-40684.json
@@ -743,10 +743,10 @@
"description": "Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group",
"fork": false,
"created_at": "2025-01-16T06:54:15Z",
- "updated_at": "2025-01-21T14:12:13Z",
+ "updated_at": "2025-01-21T19:37:31Z",
"pushed_at": "2025-01-16T09:56:36Z",
- "stargazers_count": 59,
- "watchers_count": 59,
+ "stargazers_count": 61,
+ "watchers_count": 61,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@@ -755,7 +755,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
- "watchers": 59,
+ "watchers": 61,
"score": 0,
"subscribers_count": 7
},
@@ -805,8 +805,8 @@
"description": "Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group",
"fork": false,
"created_at": "2025-01-18T15:32:21Z",
- "updated_at": "2025-01-21T17:56:07Z",
- "pushed_at": "2025-01-21T17:56:03Z",
+ "updated_at": "2025-01-22T00:11:35Z",
+ "pushed_at": "2025-01-22T00:11:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
diff --git a/2023/CVE-2023-34362.json b/2023/CVE-2023-34362.json
index 0099e862ae..211a24f29f 100644
--- a/2023/CVE-2023-34362.json
+++ b/2023/CVE-2023-34362.json
@@ -76,7 +76,7 @@
"description": "CVE-2023-34362: MOVEit Transfer Unauthenticated RCE",
"fork": false,
"created_at": "2023-06-12T12:56:12Z",
- "updated_at": "2024-09-27T17:00:38Z",
+ "updated_at": "2025-01-21T22:11:17Z",
"pushed_at": "2024-03-24T00:46:38Z",
"stargazers_count": 63,
"watchers_count": 63,
diff --git a/2023/CVE-2023-38831.json b/2023/CVE-2023-38831.json
index 903d77381f..126dc3e52e 100644
--- a/2023/CVE-2023-38831.json
+++ b/2023/CVE-2023-38831.json
@@ -14,7 +14,7 @@
"description": "lazy way to create CVE-2023-38831 winrar file for testing",
"fork": false,
"created_at": "2023-08-24T16:03:07Z",
- "updated_at": "2024-12-09T01:45:14Z",
+ "updated_at": "2025-01-21T20:35:59Z",
"pushed_at": "2023-08-24T16:13:02Z",
"stargazers_count": 92,
"watchers_count": 92,
@@ -45,7 +45,7 @@
"description": "CVE-2023-38831 winrar exploit generator",
"fork": false,
"created_at": "2023-08-25T09:44:08Z",
- "updated_at": "2025-01-18T22:50:54Z",
+ "updated_at": "2025-01-21T20:35:59Z",
"pushed_at": "2023-11-26T06:46:44Z",
"stargazers_count": 783,
"watchers_count": 783,
diff --git a/2023/CVE-2023-46604.json b/2023/CVE-2023-46604.json
index 506c2d7d08..6c7f1d1bd4 100644
--- a/2023/CVE-2023-46604.json
+++ b/2023/CVE-2023-46604.json
@@ -402,37 +402,6 @@
"score": 0,
"subscribers_count": 1
},
- {
- "id": 725243332,
- "name": "activemq-cve-2023-46604-duplicate",
- "full_name": "tomasmussi-mulesoft\/activemq-cve-2023-46604-duplicate",
- "owner": {
- "login": "tomasmussi-mulesoft",
- "id": 87021051,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87021051?v=4",
- "html_url": "https:\/\/github.com\/tomasmussi-mulesoft",
- "user_view_type": "public"
- },
- "html_url": "https:\/\/github.com\/tomasmussi-mulesoft\/activemq-cve-2023-46604-duplicate",
- "description": "Repository to exploit CVE-2023-46604 reported for ActiveMQ",
- "fork": false,
- "created_at": "2023-11-29T18:30:02Z",
- "updated_at": "2024-12-11T14:20:35Z",
- "pushed_at": "2024-11-02T13:29:04Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "has_discussions": false,
- "forks_count": 1,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 1,
- "watchers": 0,
- "score": 0,
- "subscribers_count": 1
- },
{
"id": 728564712,
"name": "CVE-Lab",
@@ -557,6 +526,37 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 737375747,
+ "name": "activemq-cve-2023-46604",
+ "full_name": "tomasmussi\/activemq-cve-2023-46604",
+ "owner": {
+ "login": "tomasmussi",
+ "id": 12720693,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12720693?v=4",
+ "html_url": "https:\/\/github.com\/tomasmussi",
+ "user_view_type": "public"
+ },
+ "html_url": "https:\/\/github.com\/tomasmussi\/activemq-cve-2023-46604",
+ "description": "Repository to exploit CVE-2023-46604 reported for ActiveMQ",
+ "fork": false,
+ "created_at": "2023-12-30T20:02:19Z",
+ "updated_at": "2025-01-21T20:11:40Z",
+ "pushed_at": "2025-01-21T20:11:37Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
{
"id": 740774996,
"name": "cve-2023-46604",
diff --git a/2024/CVE-2024-0044.json b/2024/CVE-2024-0044.json
index c9eeb489df..27a5b6e0ae 100644
--- a/2024/CVE-2024-0044.json
+++ b/2024/CVE-2024-0044.json
@@ -297,19 +297,19 @@
"description": "PoC and writeup for bypassing the initial patch of CVE-2024-0044, Android run-as any app vulnerability allowing privilege escalation from adb to installed app",
"fork": false,
"created_at": "2024-09-27T09:02:08Z",
- "updated_at": "2025-01-21T08:01:21Z",
+ "updated_at": "2025-01-21T22:38:43Z",
"pushed_at": "2024-09-30T12:48:08Z",
- "stargazers_count": 134,
- "watchers_count": 134,
+ "stargazers_count": 135,
+ "watchers_count": 135,
"has_discussions": false,
- "forks_count": 17,
+ "forks_count": 18,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 17,
- "watchers": 134,
+ "forks": 18,
+ "watchers": 135,
"score": 0,
"subscribers_count": 3
},
diff --git a/2024/CVE-2024-27198.json b/2024/CVE-2024-27198.json
index 8b3955dec0..c81ac92b0d 100644
--- a/2024/CVE-2024-27198.json
+++ b/2024/CVE-2024-27198.json
@@ -438,5 +438,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 920321578,
+ "name": "Project-Exploiting-CVE-2024-27198-RCE-Vulnerability",
+ "full_name": "ArtemCyberLab\/Project-Exploiting-CVE-2024-27198-RCE-Vulnerability",
+ "owner": {
+ "login": "ArtemCyberLab",
+ "id": 193649833,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/193649833?v=4",
+ "html_url": "https:\/\/github.com\/ArtemCyberLab",
+ "user_view_type": "public"
+ },
+ "html_url": "https:\/\/github.com\/ArtemCyberLab\/Project-Exploiting-CVE-2024-27198-RCE-Vulnerability",
+ "description": "In this project, I exploited the CVE-2024-27198-RCE vulnerability to perform a remote code execution (RCE) attack on a vulnerable TeamCity server.",
+ "fork": false,
+ "created_at": "2025-01-22T00:09:41Z",
+ "updated_at": "2025-01-22T00:16:40Z",
+ "pushed_at": "2025-01-22T00:16:37Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2024/CVE-2024-2961.json b/2024/CVE-2024-2961.json
index 34715f56c7..9f34c4d8ee 100644
--- a/2024/CVE-2024-2961.json
+++ b/2024/CVE-2024-2961.json
@@ -76,7 +76,7 @@
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
"fork": false,
"created_at": "2024-05-27T08:30:06Z",
- "updated_at": "2025-01-19T21:10:28Z",
+ "updated_at": "2025-01-21T22:11:19Z",
"pushed_at": "2024-09-30T08:45:56Z",
"stargazers_count": 428,
"watchers_count": 428,
diff --git a/2024/CVE-2024-43468.json b/2024/CVE-2024-43468.json
index 0720fe06d5..8b91356335 100644
--- a/2024/CVE-2024-43468.json
+++ b/2024/CVE-2024-43468.json
@@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-11-26T12:39:44Z",
- "updated_at": "2025-01-21T17:29:39Z",
+ "updated_at": "2025-01-21T23:57:55Z",
"pushed_at": "2025-01-16T09:48:07Z",
- "stargazers_count": 53,
- "watchers_count": 53,
+ "stargazers_count": 56,
+ "watchers_count": 56,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
- "watchers": 53,
+ "watchers": 56,
"score": 0,
"subscribers_count": 0
},
diff --git a/2024/CVE-2024-46982.json b/2024/CVE-2024-46982.json
index 00c417bafd..58219734e6 100644
--- a/2024/CVE-2024-46982.json
+++ b/2024/CVE-2024-46982.json
@@ -19,13 +19,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
+ "forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 2
diff --git a/2024/CVE-2024-53677.json b/2024/CVE-2024-53677.json
index fc762c8c27..6bf7637ec2 100644
--- a/2024/CVE-2024-53677.json
+++ b/2024/CVE-2024-53677.json
@@ -50,13 +50,13 @@
"stargazers_count": 83,
"watchers_count": 83,
"has_discussions": false,
- "forks_count": 30,
+ "forks_count": 29,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 30,
+ "forks": 29,
"watchers": 83,
"score": 0,
"subscribers_count": 3
diff --git a/2024/CVE-2024-55591.json b/2024/CVE-2024-55591.json
index 558f73d51e..899cb99842 100644
--- a/2024/CVE-2024-55591.json
+++ b/2024/CVE-2024-55591.json
@@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2025-01-16T07:26:15Z",
- "updated_at": "2025-01-21T17:35:07Z",
+ "updated_at": "2025-01-21T22:12:30Z",
"pushed_at": "2025-01-16T08:58:49Z",
- "stargazers_count": 47,
- "watchers_count": 47,
+ "stargazers_count": 48,
+ "watchers_count": 48,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
- "watchers": 47,
+ "watchers": 48,
"score": 0,
"subscribers_count": 1
},
@@ -45,8 +45,8 @@
"description": "Checks for authentication bypass vulnerability inFortinet's FortiOS, potentially exploited by remote attackers.",
"fork": false,
"created_at": "2025-01-18T15:17:07Z",
- "updated_at": "2025-01-21T18:23:33Z",
- "pushed_at": "2025-01-21T18:23:30Z",
+ "updated_at": "2025-01-22T00:29:48Z",
+ "pushed_at": "2025-01-22T00:29:45Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
diff --git a/2024/CVE-2024-9680.json b/2024/CVE-2024-9680.json
index ed4e8c78f8..97eb1b7fda 100644
--- a/2024/CVE-2024-9680.json
+++ b/2024/CVE-2024-9680.json
@@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-10-17T16:10:38Z",
- "updated_at": "2025-01-20T10:36:02Z",
+ "updated_at": "2025-01-21T23:20:25Z",
"pushed_at": "2024-10-17T16:28:17Z",
- "stargazers_count": 7,
- "watchers_count": 7,
+ "stargazers_count": 8,
+ "watchers_count": 8,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 7,
+ "watchers": 8,
"score": 0,
"subscribers_count": 1
},
diff --git a/2025/CVE-2025-0282.json b/2025/CVE-2025-0282.json
index dd3ba73b68..b996783e28 100644
--- a/2025/CVE-2025-0282.json
+++ b/2025/CVE-2025-0282.json
@@ -138,10 +138,10 @@
"description": "PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gateways",
"fork": false,
"created_at": "2025-01-16T14:45:53Z",
- "updated_at": "2025-01-21T15:43:50Z",
+ "updated_at": "2025-01-21T23:59:22Z",
"pushed_at": "2025-01-16T20:09:52Z",
- "stargazers_count": 24,
- "watchers_count": 24,
+ "stargazers_count": 25,
+ "watchers_count": 25,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@@ -150,7 +150,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
- "watchers": 24,
+ "watchers": 25,
"score": 0,
"subscribers_count": 0
},
diff --git a/2025/CVE-2025-22620.json b/2025/CVE-2025-22620.json
index f26b2b99c0..ff3c51a48b 100644
--- a/2025/CVE-2025-22620.json
+++ b/2025/CVE-2025-22620.json
@@ -15,7 +15,7 @@
"fork": false,
"created_at": "2025-01-19T05:31:13Z",
"updated_at": "2025-01-20T04:16:51Z",
- "pushed_at": "2025-01-20T04:17:36Z",
+ "pushed_at": "2025-01-21T21:09:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
diff --git a/README.md b/README.md
index 5df010f66a..ee1a78ad2a 100644
--- a/README.md
+++ b/README.md
@@ -4321,6 +4321,7 @@
- [jrbH4CK/CVE-2024-27198](https://github.com/jrbH4CK/CVE-2024-27198)
- [geniuszly/CVE-2024-27198](https://github.com/geniuszly/CVE-2024-27198)
- [Cythonic1/CVE-2024-27198_POC](https://github.com/Cythonic1/CVE-2024-27198_POC)
+- [ArtemCyberLab/Project-Exploiting-CVE-2024-27198-RCE-Vulnerability](https://github.com/ArtemCyberLab/Project-Exploiting-CVE-2024-27198-RCE-Vulnerability)
### CVE-2024-27292 (2024-02-29)
@@ -7461,7 +7462,11 @@
- [OpenXP-Research/CVE-2024-48360](https://github.com/OpenXP-Research/CVE-2024-48360)
-### CVE-2024-48392
+### CVE-2024-48392 (2025-01-21)
+
+OrangeScrum v2.0.11 is vulnerable to Cross Site Scripting (XSS). An attacker can inject malicious JavaScript code into user email due to lack of input validation, which could lead to account takeover.
+
+
- [Renzusclarke/CVE-2024-48392-PoC](https://github.com/Renzusclarke/CVE-2024-48392-PoC)
### CVE-2024-48415 (2024-10-22)
@@ -8360,13 +8365,25 @@
- [nscan9/CVE-2024-54761-BigAnt-Office-Messenger-5.6.06-RCE-via-SQL-Injection](https://github.com/nscan9/CVE-2024-54761-BigAnt-Office-Messenger-5.6.06-RCE-via-SQL-Injection)
-### CVE-2024-54792
+### CVE-2024-54792 (2025-01-21)
+
+A Cross-Site Request Forgery (CSRF) vulnerability has been found in SpagoBI v3.5.1 in the user administration panel. An authenticated user can lead another user into executing unwanted actions inside the application they are logged in, like adding, editing or deleting users.
+
+
- [MarioTesoro/CVE-2024-54792](https://github.com/MarioTesoro/CVE-2024-54792)
-### CVE-2024-54794
+### CVE-2024-54794 (2025-01-21)
+
+The script input feature of SpagoBI 3.5.1 allows arbitrary code execution.
+
+
- [MarioTesoro/CVE-2024-54794](https://github.com/MarioTesoro/CVE-2024-54794)
-### CVE-2024-54795
+### CVE-2024-54795 (2025-01-21)
+
+SpagoBI v3.5.1 contains multiple Stored Cross-Site Scripting (XSS) vulnerabilities in the create/edit forms of the worksheet designer function.
+
+
- [MarioTesoro/CVE-2024-54795](https://github.com/MarioTesoro/CVE-2024-54795)
### CVE-2024-54819 (2025-01-07)
@@ -8414,7 +8431,11 @@
- [SyFi/CVE-2024-55503](https://github.com/SyFi/CVE-2024-55503)
-### CVE-2024-55504
+### CVE-2024-55504 (2025-01-21)
+
+An issue in RAR Extractor - Unarchiver Free and Pro v.6.4.0 allows local attackers to inject arbitrary code potentially leading to remote control and unauthorized access to sensitive user data via the exploit_combined.dylib component on MacOS.
+
+
- [SyFi/CVE-2024-55504](https://github.com/SyFi/CVE-2024-55504)
### CVE-2024-55511 (2025-01-16)
@@ -16029,11 +16050,11 @@
- [NKeshawarz/CVE-2023-46604-RCE](https://github.com/NKeshawarz/CVE-2023-46604-RCE)
- [minhangxiaohui/ActiveMQ_CVE-2023-46604](https://github.com/minhangxiaohui/ActiveMQ_CVE-2023-46604)
- [nitzanoligo/CVE-2023-46604-demo](https://github.com/nitzanoligo/CVE-2023-46604-demo)
-- [tomasmussi-mulesoft/activemq-cve-2023-46604-duplicate](https://github.com/tomasmussi-mulesoft/activemq-cve-2023-46604-duplicate)
- [dcm2406/CVE-Lab](https://github.com/dcm2406/CVE-Lab)
- [mrpentst/CVE-2023-46604](https://github.com/mrpentst/CVE-2023-46604)
- [dcm2406/CVE-2023-46604](https://github.com/dcm2406/CVE-2023-46604)
- [Mudoleto/Broker_ApacheMQ](https://github.com/Mudoleto/Broker_ApacheMQ)
+- [tomasmussi/activemq-cve-2023-46604](https://github.com/tomasmussi/activemq-cve-2023-46604)
- [hh-hunter/cve-2023-46604](https://github.com/hh-hunter/cve-2023-46604)
- [stegano5/ExploitScript-CVE-2023-46604](https://github.com/stegano5/ExploitScript-CVE-2023-46604)
- [Arlenhiack/ActiveMQ-RCE-Exploit](https://github.com/Arlenhiack/ActiveMQ-RCE-Exploit)