From f82e27b6e80aa894513e92f7277bbacec88dea53 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Sun, 3 Nov 2024 03:30:40 +0900 Subject: [PATCH] Auto Update 2024/11/02 18:30:40 --- 2014/CVE-2014-0195.json | 2 +- 2015/CVE-2015-9251.json | 2 +- 2021/CVE-2021-1675.json | 16 ++++++++-------- 2021/CVE-2021-42287.json | 8 ++++---- 2021/CVE-2021-43267.json | 8 ++++---- 2021/CVE-2021-44228.json | 8 ++++---- 2022/CVE-2022-21882.json | 8 ++++---- 2022/CVE-2022-21907.json | 8 ++++---- 2022/CVE-2022-21999.json | 8 ++++---- 2022/CVE-2022-25943.json | 8 ++++---- 2023/CVE-2023-21716.json | 8 ++++---- 2023/CVE-2023-21768.json | 8 ++++---- 2023/CVE-2023-33246.json | 8 ++++---- 2023/CVE-2023-36874.json | 8 ++++---- 2023/CVE-2023-39320.json | 4 ++-- 2023/CVE-2023-4220.json | 31 +++++++++++++++++++++++++++++++ 2023/CVE-2023-45866.json | 8 ++++---- 2023/CVE-2023-46604.json | 4 ++-- 2024/CVE-2024-21338.json | 8 ++++---- 2024/CVE-2024-21413.json | 8 ++++---- 2024/CVE-2024-23113.json | 10 +++++----- 2024/CVE-2024-27804.json | 8 ++++---- 2024/CVE-2024-47575.json | 8 ++++---- 2024/CVE-2024-48325.json | 33 +++++++++++++++++++++++++++++++++ 2024/CVE-2024-51132.json | 33 +++++++++++++++++++++++++++++++++ 2024/CVE-2024-51358.json | 33 +++++++++++++++++++++++++++++++++ 2024/CVE-2024-7029.json | 8 ++++---- README.md | 10 ++++++++++ 28 files changed, 227 insertions(+), 87 deletions(-) create mode 100644 2024/CVE-2024-48325.json create mode 100644 2024/CVE-2024-51132.json create mode 100644 2024/CVE-2024-51358.json diff --git a/2014/CVE-2014-0195.json b/2014/CVE-2014-0195.json index 2475caa6af..87f47255fc 100644 --- a/2014/CVE-2014-0195.json +++ b/2014/CVE-2014-0195.json @@ -59,6 +59,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2015/CVE-2015-9251.json b/2015/CVE-2015-9251.json index 73fe4a5186..bd9c338818 100644 --- a/2015/CVE-2015-9251.json +++ b/2015/CVE-2015-9251.json @@ -59,6 +59,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index e0cb8e4c57..2df856facc 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -45,10 +45,10 @@ "description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527", "fork": false, "created_at": "2021-06-29T17:24:14Z", - "updated_at": "2024-11-01T02:37:59Z", + "updated_at": "2024-11-02T14:40:32Z", "pushed_at": "2021-07-20T15:28:13Z", - "stargazers_count": 1837, - "watchers_count": 1837, + "stargazers_count": 1836, + "watchers_count": 1836, "has_discussions": false, "forks_count": 583, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 583, - "watchers": 1837, + "watchers": 1836, "score": 0, "subscribers_count": 43 }, @@ -311,10 +311,10 @@ "description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)", "fork": false, "created_at": "2021-07-01T23:45:58Z", - "updated_at": "2024-10-25T09:32:08Z", + "updated_at": "2024-11-02T14:40:31Z", "pushed_at": "2021-07-05T08:54:06Z", - "stargazers_count": 1012, - "watchers_count": 1012, + "stargazers_count": 1011, + "watchers_count": 1011, "has_discussions": false, "forks_count": 230, "allow_forking": true, @@ -323,7 +323,7 @@ "topics": [], "visibility": "public", "forks": 230, - "watchers": 1012, + "watchers": 1011, "score": 0, "subscribers_count": 26 }, diff --git a/2021/CVE-2021-42287.json b/2021/CVE-2021-42287.json index 1b47fa90d0..6ac4b80672 100644 --- a/2021/CVE-2021-42287.json +++ b/2021/CVE-2021-42287.json @@ -14,10 +14,10 @@ "description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.", "fork": false, "created_at": "2021-12-11T19:27:30Z", - "updated_at": "2024-10-29T21:41:52Z", + "updated_at": "2024-11-02T14:48:58Z", "pushed_at": "2021-12-16T09:50:15Z", - "stargazers_count": 1335, - "watchers_count": 1335, + "stargazers_count": 1336, + "watchers_count": 1336, "has_discussions": false, "forks_count": 321, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 321, - "watchers": 1335, + "watchers": 1336, "score": 0, "subscribers_count": 27 }, diff --git a/2021/CVE-2021-43267.json b/2021/CVE-2021-43267.json index b4a43f557d..10cbc9a9e5 100644 --- a/2021/CVE-2021-43267.json +++ b/2021/CVE-2021-43267.json @@ -45,10 +45,10 @@ "description": "Local PoC exploit for CVE-2021-43267 (Linux TIPC)", "fork": false, "created_at": "2021-11-26T04:00:56Z", - "updated_at": "2024-10-28T17:42:33Z", + "updated_at": "2024-11-02T14:53:56Z", "pushed_at": "2021-11-26T01:54:47Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 13, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 13, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 } diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index b964fbf94a..9ac39509b2 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -884,10 +884,10 @@ "description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks", "fork": false, "created_at": "2021-12-10T22:35:00Z", - "updated_at": "2024-10-31T16:32:21Z", + "updated_at": "2024-11-02T15:12:49Z", "pushed_at": "2022-01-15T16:18:44Z", - "stargazers_count": 933, - "watchers_count": 933, + "stargazers_count": 934, + "watchers_count": 934, "has_discussions": false, "forks_count": 142, "allow_forking": true, @@ -916,7 +916,7 @@ ], "visibility": "public", "forks": 142, - "watchers": 933, + "watchers": 934, "score": 0, "subscribers_count": 25 }, diff --git a/2022/CVE-2022-21882.json b/2022/CVE-2022-21882.json index 812434041c..efab69b51f 100644 --- a/2022/CVE-2022-21882.json +++ b/2022/CVE-2022-21882.json @@ -14,10 +14,10 @@ "description": "win32k LPE ", "fork": false, "created_at": "2022-01-27T03:44:10Z", - "updated_at": "2024-09-24T16:59:10Z", + "updated_at": "2024-11-02T12:41:43Z", "pushed_at": "2022-01-27T04:18:18Z", - "stargazers_count": 458, - "watchers_count": 458, + "stargazers_count": 459, + "watchers_count": 459, "has_discussions": false, "forks_count": 134, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 134, - "watchers": 458, + "watchers": 459, "score": 0, "subscribers_count": 14 }, diff --git a/2022/CVE-2022-21907.json b/2022/CVE-2022-21907.json index 55be0ac418..028d63fded 100644 --- a/2022/CVE-2022-21907.json +++ b/2022/CVE-2022-21907.json @@ -96,10 +96,10 @@ "description": "HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907", "fork": false, "created_at": "2022-01-17T02:28:50Z", - "updated_at": "2024-09-02T03:01:12Z", + "updated_at": "2024-11-02T16:24:21Z", "pushed_at": "2022-01-20T02:07:59Z", - "stargazers_count": 362, - "watchers_count": 362, + "stargazers_count": 361, + "watchers_count": 361, "has_discussions": false, "forks_count": 98, "allow_forking": true, @@ -108,7 +108,7 @@ "topics": [], "visibility": "public", "forks": 98, - "watchers": 362, + "watchers": 361, "score": 0, "subscribers_count": 10 }, diff --git a/2022/CVE-2022-21999.json b/2022/CVE-2022-21999.json index 7cdd29ddfd..62a17f348c 100644 --- a/2022/CVE-2022-21999.json +++ b/2022/CVE-2022-21999.json @@ -14,10 +14,10 @@ "description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)", "fork": false, "created_at": "2022-02-08T17:25:44Z", - "updated_at": "2024-10-31T05:35:09Z", + "updated_at": "2024-11-02T12:37:11Z", "pushed_at": "2022-02-09T16:54:09Z", - "stargazers_count": 771, - "watchers_count": 771, + "stargazers_count": 772, + "watchers_count": 772, "has_discussions": false, "forks_count": 160, "allow_forking": true, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 160, - "watchers": 771, + "watchers": 772, "score": 0, "subscribers_count": 15 } diff --git a/2022/CVE-2022-25943.json b/2022/CVE-2022-25943.json index 77cae0fc99..5b6cb902ff 100644 --- a/2022/CVE-2022-25943.json +++ b/2022/CVE-2022-25943.json @@ -14,10 +14,10 @@ "description": "CVE-2022-25943", "fork": false, "created_at": "2021-07-09T23:34:57Z", - "updated_at": "2024-09-12T09:58:59Z", + "updated_at": "2024-11-02T17:34:01Z", "pushed_at": "2022-03-09T08:26:45Z", - "stargazers_count": 60, - "watchers_count": 60, + "stargazers_count": 59, + "watchers_count": 59, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 15, - "watchers": 60, + "watchers": 59, "score": 0, "subscribers_count": 4 }, diff --git a/2023/CVE-2023-21716.json b/2023/CVE-2023-21716.json index 900b7dd0af..e1ff40551a 100644 --- a/2023/CVE-2023-21716.json +++ b/2023/CVE-2023-21716.json @@ -293,10 +293,10 @@ "description": "POC CVE 2023-21716", "fork": false, "created_at": "2024-10-30T09:38:36Z", - "updated_at": "2024-10-30T09:50:53Z", + "updated_at": "2024-11-02T16:26:31Z", "pushed_at": "2024-10-30T09:42:01Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -312,7 +312,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-21768.json b/2023/CVE-2023-21768.json index 41f112dc2e..75774c983d 100644 --- a/2023/CVE-2023-21768.json +++ b/2023/CVE-2023-21768.json @@ -14,10 +14,10 @@ "description": "LPE exploit for CVE-2023-21768", "fork": false, "created_at": "2023-03-07T23:00:27Z", - "updated_at": "2024-11-01T13:46:04Z", + "updated_at": "2024-11-02T14:40:43Z", "pushed_at": "2023-07-10T16:35:49Z", - "stargazers_count": 476, - "watchers_count": 476, + "stargazers_count": 477, + "watchers_count": 477, "has_discussions": false, "forks_count": 163, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 163, - "watchers": 476, + "watchers": 477, "score": 0, "subscribers_count": 10 }, diff --git a/2023/CVE-2023-33246.json b/2023/CVE-2023-33246.json index f6abe8b4ec..f888119b26 100644 --- a/2023/CVE-2023-33246.json +++ b/2023/CVE-2023-33246.json @@ -138,10 +138,10 @@ "description": "CVE-2023-33246 RocketMQ RCE Detect By Version and Exploit", "fork": false, "created_at": "2023-06-01T14:48:26Z", - "updated_at": "2024-07-18T05:59:33Z", + "updated_at": "2024-11-02T14:31:06Z", "pushed_at": "2023-06-07T13:07:30Z", - "stargazers_count": 98, - "watchers_count": 98, + "stargazers_count": 99, + "watchers_count": 99, "has_discussions": false, "forks_count": 21, "allow_forking": true, @@ -154,7 +154,7 @@ ], "visibility": "public", "forks": 21, - "watchers": 98, + "watchers": 99, "score": 0, "subscribers_count": 3 }, diff --git a/2023/CVE-2023-36874.json b/2023/CVE-2023-36874.json index 46c1be5cc7..7470bbad82 100644 --- a/2023/CVE-2023-36874.json +++ b/2023/CVE-2023-36874.json @@ -76,10 +76,10 @@ "description": null, "fork": false, "created_at": "2023-08-23T12:07:40Z", - "updated_at": "2024-10-01T16:24:20Z", + "updated_at": "2024-11-02T16:38:14Z", "pushed_at": "2023-08-23T16:46:53Z", - "stargazers_count": 234, - "watchers_count": 234, + "stargazers_count": 233, + "watchers_count": 233, "has_discussions": false, "forks_count": 47, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 47, - "watchers": 234, + "watchers": 233, "score": 0, "subscribers_count": 5 }, diff --git a/2023/CVE-2023-39320.json b/2023/CVE-2023-39320.json index 134c058e8d..23864c015b 100644 --- a/2023/CVE-2023-39320.json +++ b/2023/CVE-2023-39320.json @@ -19,13 +19,13 @@ "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 diff --git a/2023/CVE-2023-4220.json b/2023/CVE-2023-4220.json index c7703278ff..8c8de924cd 100644 --- a/2023/CVE-2023-4220.json +++ b/2023/CVE-2023-4220.json @@ -562,5 +562,36 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 882333805, + "name": "CVE-2023-4220", + "full_name": "H4cking4All\/CVE-2023-4220", + "owner": { + "login": "H4cking4All", + "id": 187107603, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/187107603?v=4", + "html_url": "https:\/\/github.com\/H4cking4All", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/H4cking4All\/CVE-2023-4220", + "description": "CVE-2023-4220 Chamilo Exploit", + "fork": false, + "created_at": "2024-11-02T14:49:51Z", + "updated_at": "2024-11-02T15:09:11Z", + "pushed_at": "2024-11-02T15:09:08Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index 980d4ffc9f..29c3285b4e 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -14,10 +14,10 @@ "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "fork": false, "created_at": "2024-01-16T06:52:02Z", - "updated_at": "2024-11-02T06:24:53Z", + "updated_at": "2024-11-02T16:12:41Z", "pushed_at": "2024-08-18T08:26:46Z", - "stargazers_count": 1245, - "watchers_count": 1245, + "stargazers_count": 1248, + "watchers_count": 1248, "has_discussions": false, "forks_count": 209, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 209, - "watchers": 1245, + "watchers": 1248, "score": 0, "subscribers_count": 20 }, diff --git a/2023/CVE-2023-46604.json b/2023/CVE-2023-46604.json index 3216d7724f..db67b1aee5 100644 --- a/2023/CVE-2023-46604.json +++ b/2023/CVE-2023-46604.json @@ -450,8 +450,8 @@ "description": "Repository to exploit CVE-2023-46604 reported for ActiveMQ", "fork": false, "created_at": "2023-11-29T18:30:02Z", - "updated_at": "2023-11-29T19:27:53Z", - "pushed_at": "2023-11-29T19:51:27Z", + "updated_at": "2024-11-02T13:29:09Z", + "pushed_at": "2024-11-02T13:29:04Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2024/CVE-2024-21338.json b/2024/CVE-2024-21338.json index 0b6808ee33..c62d10cd07 100644 --- a/2024/CVE-2024-21338.json +++ b/2024/CVE-2024-21338.json @@ -14,10 +14,10 @@ "description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.", "fork": false, "created_at": "2024-04-13T05:53:02Z", - "updated_at": "2024-10-30T20:07:59Z", + "updated_at": "2024-11-02T13:51:30Z", "pushed_at": "2024-04-16T21:00:14Z", - "stargazers_count": 282, - "watchers_count": 282, + "stargazers_count": 281, + "watchers_count": 281, "has_discussions": false, "forks_count": 60, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 60, - "watchers": 282, + "watchers": 281, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-21413.json b/2024/CVE-2024-21413.json index a0fe2bc355..0f01231787 100644 --- a/2024/CVE-2024-21413.json +++ b/2024/CVE-2024-21413.json @@ -45,10 +45,10 @@ "description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability", "fork": false, "created_at": "2024-02-16T15:17:59Z", - "updated_at": "2024-10-30T15:04:29Z", + "updated_at": "2024-11-02T13:51:20Z", "pushed_at": "2024-02-19T20:00:35Z", - "stargazers_count": 686, - "watchers_count": 686, + "stargazers_count": 685, + "watchers_count": 685, "has_discussions": false, "forks_count": 152, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 152, - "watchers": 686, + "watchers": 685, "score": 0, "subscribers_count": 10 }, diff --git a/2024/CVE-2024-23113.json b/2024/CVE-2024-23113.json index ca12735f46..9762680878 100644 --- a/2024/CVE-2024-23113.json +++ b/2024/CVE-2024-23113.json @@ -298,10 +298,10 @@ "description": "POC TO RCE", "fork": false, "created_at": "2024-11-02T12:28:16Z", - "updated_at": "2024-11-02T12:30:26Z", - "pushed_at": "2024-11-02T12:30:23Z", - "stargazers_count": 0, - "watchers_count": 0, + "updated_at": "2024-11-02T12:36:59Z", + "pushed_at": "2024-11-02T12:31:23Z", + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -310,7 +310,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-27804.json b/2024/CVE-2024-27804.json index 1ed2104f87..89303eed46 100644 --- a/2024/CVE-2024-27804.json +++ b/2024/CVE-2024-27804.json @@ -14,10 +14,10 @@ "description": "POC for CVE-2024-27804", "fork": false, "created_at": "2024-05-14T14:17:06Z", - "updated_at": "2024-10-25T09:59:01Z", + "updated_at": "2024-11-02T13:14:28Z", "pushed_at": "2024-05-14T14:55:23Z", - "stargazers_count": 134, - "watchers_count": 134, + "stargazers_count": 133, + "watchers_count": 133, "has_discussions": false, "forks_count": 25, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 25, - "watchers": 134, + "watchers": 133, "score": 0, "subscribers_count": 6 } diff --git a/2024/CVE-2024-47575.json b/2024/CVE-2024-47575.json index cbda187bb4..62de340f08 100644 --- a/2024/CVE-2024-47575.json +++ b/2024/CVE-2024-47575.json @@ -76,10 +76,10 @@ "description": null, "fork": false, "created_at": "2024-10-27T08:24:35Z", - "updated_at": "2024-11-02T11:11:12Z", + "updated_at": "2024-11-02T12:34:33Z", "pushed_at": "2024-11-02T11:11:08Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 5, + "watchers": 6, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-48325.json b/2024/CVE-2024-48325.json new file mode 100644 index 0000000000..82716fa837 --- /dev/null +++ b/2024/CVE-2024-48325.json @@ -0,0 +1,33 @@ +[ + { + "id": 882387857, + "name": "cve-2024-48325", + "full_name": "osvaldotenorio\/cve-2024-48325", + "owner": { + "login": "osvaldotenorio", + "id": 45275816, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45275816?v=4", + "html_url": "https:\/\/github.com\/osvaldotenorio", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/osvaldotenorio\/cve-2024-48325", + "description": null, + "fork": false, + "created_at": "2024-11-02T17:43:12Z", + "updated_at": "2024-11-02T18:02:31Z", + "pushed_at": "2024-11-02T18:02:29Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-51132.json b/2024/CVE-2024-51132.json new file mode 100644 index 0000000000..a29be5e745 --- /dev/null +++ b/2024/CVE-2024-51132.json @@ -0,0 +1,33 @@ +[ + { + "id": 882327865, + "name": "CVE-2024-51132-POC", + "full_name": "JAckLosingHeart\/CVE-2024-51132-POC", + "owner": { + "login": "JAckLosingHeart", + "id": 57932150, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57932150?v=4", + "html_url": "https:\/\/github.com\/JAckLosingHeart", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/JAckLosingHeart\/CVE-2024-51132-POC", + "description": null, + "fork": false, + "created_at": "2024-11-02T14:30:29Z", + "updated_at": "2024-11-02T14:42:13Z", + "pushed_at": "2024-11-02T14:42:09Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-51358.json b/2024/CVE-2024-51358.json new file mode 100644 index 0000000000..d05de5834e --- /dev/null +++ b/2024/CVE-2024-51358.json @@ -0,0 +1,33 @@ +[ + { + "id": 882335500, + "name": "CVE-2024-51358", + "full_name": "Kov404\/CVE-2024-51358", + "owner": { + "login": "Kov404", + "id": 177751667, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/177751667?v=4", + "html_url": "https:\/\/github.com\/Kov404", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Kov404\/CVE-2024-51358", + "description": null, + "fork": false, + "created_at": "2024-11-02T14:55:00Z", + "updated_at": "2024-11-02T14:56:08Z", + "pushed_at": "2024-11-02T14:56:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-7029.json b/2024/CVE-2024-7029.json index fcd128b347..78935a8c5e 100644 --- a/2024/CVE-2024-7029.json +++ b/2024/CVE-2024-7029.json @@ -85,10 +85,10 @@ "description": " A PoC exploit for the CVE-2024-7029 vulnerability found in AvTech devices, allowing Remote Code Execution (RCE)", "fork": false, "created_at": "2024-10-08T10:04:08Z", - "updated_at": "2024-10-21T08:14:58Z", + "updated_at": "2024-11-02T15:01:17Z", "pushed_at": "2024-10-08T10:08:07Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -97,7 +97,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 5, + "watchers": 7, "score": 0, "subscribers_count": 2 } diff --git a/README.md b/README.md index aeeb9e3387..7967600646 100644 --- a/README.md +++ b/README.md @@ -5748,6 +5748,9 @@ ### CVE-2024-48217 - [ajrielrm/CVE-2024-48217](https://github.com/ajrielrm/CVE-2024-48217) +### CVE-2024-48325 +- [osvaldotenorio/cve-2024-48325](https://github.com/osvaldotenorio/cve-2024-48325) + ### CVE-2024-48392 - [Renzusclarke/CVE-2024-48392-PoC](https://github.com/Renzusclarke/CVE-2024-48392-PoC) @@ -5782,6 +5785,12 @@ ### CVE-2024-50550 - [AleksaZatezalo/CVE-2024-50550](https://github.com/AleksaZatezalo/CVE-2024-50550) +### CVE-2024-51132 +- [JAckLosingHeart/CVE-2024-51132-POC](https://github.com/JAckLosingHeart/CVE-2024-51132-POC) + +### CVE-2024-51358 +- [Kov404/CVE-2024-51358](https://github.com/Kov404/CVE-2024-51358) + ### CVE-2024-51378 - [refr4g/CVE-2024-51378](https://github.com/refr4g/CVE-2024-51378) @@ -6650,6 +6659,7 @@ - [0x00-null/Chamilo-CVE-2023-4220-RCE-Exploit](https://github.com/0x00-null/Chamilo-CVE-2023-4220-RCE-Exploit) - [bueno-armando/CVE-2023-4220-RCE](https://github.com/bueno-armando/CVE-2023-4220-RCE) - [TanveerS1ngh/Chamilo-LMS-CVE-2023-4220-Exploit](https://github.com/TanveerS1ngh/Chamilo-LMS-CVE-2023-4220-Exploit) +- [H4cking4All/CVE-2023-4220](https://github.com/H4cking4All/CVE-2023-4220) ### CVE-2023-4226 (2023-11-28)