From faa4a96fecd3fcd6fb7d72dedea690a95cc3eea9 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Mon, 16 Dec 2024 21:33:27 +0900 Subject: [PATCH] Auto Update 2024/12/16 12:33:27 --- 2006/CVE-2006-20001.json | 8 ++++---- 2015/CVE-2015-9251.json | 8 ++++---- 2017/CVE-2017-12615.json | 8 ++++---- 2017/CVE-2017-12617.json | 4 ++-- 2018/CVE-2018-19320.json | 8 ++++---- 2019/CVE-2019-0193.json | 4 ++-- 2019/CVE-2019-0708.json | 4 ++-- 2019/CVE-2019-11043.json | 8 ++++---- 2019/CVE-2019-2618.json | 4 ++-- 2020/CVE-2020-0041.json | 8 ++++---- 2020/CVE-2020-0601.json | 4 ++-- 2020/CVE-2020-14144.json | 8 ++++---- 2020/CVE-2020-1938.json | 8 ++++---- 2020/CVE-2020-7471.json | 4 ++-- 2021/CVE-2021-3129.json | 8 ++++---- 2021/CVE-2021-3560.json | 24 +++++++++++----------- 2021/CVE-2021-42321.json | 31 ----------------------------- 2021/CVE-2021-44228.json | 31 +++++++++++++++++++++++++++++ 2022/CVE-2022-21445.json | 8 ++++---- 2022/CVE-2022-23277.json | 31 ----------------------------- 2023/CVE-2023-22515.json | 10 +++++----- 2023/CVE-2023-23752.json | 8 ++++---- 2023/CVE-2023-25157.json | 4 ++-- 2023/CVE-2023-38709.json | 8 ++++---- 2023/CVE-2023-40028.json | 8 ++++---- 2023/CVE-2023-44976.json | 4 ++-- 2023/CVE-2023-45866.json | 8 ++++---- 2024/CVE-2024-0044.json | 8 ++++---- 2024/CVE-2024-0582.json | 2 +- 2024/CVE-2024-10220.json | 2 +- 2024/CVE-2024-10914.json | 4 ++-- 2024/CVE-2024-11477.json | 8 ++++---- 2024/CVE-2024-11680.json | 8 ++++---- 2024/CVE-2024-11972.json | 8 ++++---- 2024/CVE-2024-21306.json | 2 +- 2024/CVE-2024-21542.json | 2 +- 2024/CVE-2024-26229.json | 8 ++++---- 2024/CVE-2024-2961.json | 8 ++++---- 2024/CVE-2024-38193.json | 8 ++++---- 2024/CVE-2024-38472.json | 8 ++++---- 2024/CVE-2024-38819.json | 43 ++++++++++++++++++++++++++++++++++------ 2024/CVE-2024-44193.json | 4 ++-- 2024/CVE-2024-4577.json | 8 ++++---- 2024/CVE-2024-4956.json | 4 ++-- 2024/CVE-2024-53376.json | 2 +- 2024/CVE-2024-53677.json | 16 +++++++-------- 2024/CVE-2024-55557.json | 2 +- 2024/CVE-2024-56115.json | 33 ++++++++++++++++++++++++++++++ 2024/CVE-2024-56116.json | 33 ++++++++++++++++++++++++++++++ 2024/CVE-2024-6387.json | 12 +++++------ 2024/CVE-2024-6778.json | 8 ++++---- 2024/CVE-2024-9474.json | 2 +- README.md | 16 ++++++++++----- 53 files changed, 301 insertions(+), 229 deletions(-) create mode 100644 2024/CVE-2024-56115.json create mode 100644 2024/CVE-2024-56116.json diff --git a/2006/CVE-2006-20001.json b/2006/CVE-2006-20001.json index 7db70842a5..9b5350d9b5 100644 --- a/2006/CVE-2006-20001.json +++ b/2006/CVE-2006-20001.json @@ -2,15 +2,15 @@ { "id": 598440551, "name": "CVE-2006-20001", - "full_name": "Saksham2002\/CVE-2006-20001", + "full_name": "r1az4r\/CVE-2006-20001", "owner": { - "login": "Saksham2002", + "login": "r1az4r", "id": 31695520, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31695520?v=4", - "html_url": "https:\/\/github.com\/Saksham2002", + "html_url": "https:\/\/github.com\/r1az4r", "user_view_type": "public" }, - "html_url": "https:\/\/github.com\/Saksham2002\/CVE-2006-20001", + "html_url": "https:\/\/github.com\/r1az4r\/CVE-2006-20001", "description": "A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash. This issue affects Apache HTTP Server 2.4.54 and earlier. CVE project by @Sn0wAlice", "fork": false, "created_at": "2023-02-07T05:30:52Z", diff --git a/2015/CVE-2015-9251.json b/2015/CVE-2015-9251.json index bd9c338818..fa7eff5614 100644 --- a/2015/CVE-2015-9251.json +++ b/2015/CVE-2015-9251.json @@ -45,10 +45,10 @@ "description": "PoC para CVE-2015-9251 jQuery menor a 3.0.0.", "fork": false, "created_at": "2024-11-01T16:02:04Z", - "updated_at": "2024-11-01T16:04:08Z", + "updated_at": "2024-12-16T06:35:07Z", "pushed_at": "2024-11-01T16:04:04Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2017/CVE-2017-12615.json b/2017/CVE-2017-12615.json index 45975f123b..e9619db0c2 100644 --- a/2017/CVE-2017-12615.json +++ b/2017/CVE-2017-12615.json @@ -417,10 +417,10 @@ "description": "tomcat自动化漏洞扫描利用工具,支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含", "fork": false, "created_at": "2024-08-29T06:38:16Z", - "updated_at": "2024-12-12T15:55:33Z", + "updated_at": "2024-12-16T09:11:32Z", "pushed_at": "2024-11-13T03:12:58Z", - "stargazers_count": 158, - "watchers_count": 158, + "stargazers_count": 159, + "watchers_count": 159, "has_discussions": false, "forks_count": 14, "allow_forking": true, @@ -437,7 +437,7 @@ ], "visibility": "public", "forks": 14, - "watchers": 158, + "watchers": 159, "score": 0, "subscribers_count": 2 }, diff --git a/2017/CVE-2017-12617.json b/2017/CVE-2017-12617.json index 1285dd6838..b6d26e8c9e 100644 --- a/2017/CVE-2017-12617.json +++ b/2017/CVE-2017-12617.json @@ -330,8 +330,8 @@ "description": "Improved version of PikaChu CVE", "fork": false, "created_at": "2024-12-13T11:22:38Z", - "updated_at": "2024-12-13T11:31:35Z", - "pushed_at": "2024-12-13T11:31:31Z", + "updated_at": "2024-12-16T10:14:43Z", + "pushed_at": "2024-12-16T10:14:39Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2018/CVE-2018-19320.json b/2018/CVE-2018-19320.json index 906ddea2bc..5b3c20dfe0 100644 --- a/2018/CVE-2018-19320.json +++ b/2018/CVE-2018-19320.json @@ -76,10 +76,10 @@ "description": "Unsigned driver loader using CVE-2018-19320", "fork": false, "created_at": "2022-11-12T05:48:13Z", - "updated_at": "2024-12-12T20:58:15Z", + "updated_at": "2024-12-16T08:40:23Z", "pushed_at": "2023-04-09T13:50:29Z", - "stargazers_count": 212, - "watchers_count": 212, + "stargazers_count": 213, + "watchers_count": 213, "has_discussions": false, "forks_count": 57, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 57, - "watchers": 212, + "watchers": 213, "score": 0, "subscribers_count": 9 } diff --git a/2019/CVE-2019-0193.json b/2019/CVE-2019-0193.json index 7de1bbee9b..b67fe60266 100644 --- a/2019/CVE-2019-0193.json +++ b/2019/CVE-2019-0193.json @@ -19,13 +19,13 @@ "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, - "forks_count": 6, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 6, + "forks": 4, "watchers": 7, "score": 0, "subscribers_count": 1 diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 3c9f1680ce..d9f2a99d32 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -1907,13 +1907,13 @@ "stargazers_count": 1175, "watchers_count": 1175, "has_discussions": false, - "forks_count": 346, + "forks_count": 345, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 346, + "forks": 345, "watchers": 1175, "score": 0, "subscribers_count": 68 diff --git a/2019/CVE-2019-11043.json b/2019/CVE-2019-11043.json index c049d4886b..9fa4241a03 100644 --- a/2019/CVE-2019-11043.json +++ b/2019/CVE-2019-11043.json @@ -107,10 +107,10 @@ "description": "php-fpm+Nginx RCE", "fork": false, "created_at": "2019-10-23T23:26:57Z", - "updated_at": "2024-10-30T08:09:01Z", + "updated_at": "2024-12-16T11:23:42Z", "pushed_at": "2020-08-20T04:43:25Z", - "stargazers_count": 101, - "watchers_count": 101, + "stargazers_count": 102, + "watchers_count": 102, "has_discussions": false, "forks_count": 37, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 37, - "watchers": 101, + "watchers": 102, "score": 0, "subscribers_count": 4 }, diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 1b53614ea6..0d8bec8b2b 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -112,13 +112,13 @@ "stargazers_count": 952, "watchers_count": 952, "has_discussions": false, - "forks_count": 178, + "forks_count": 176, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 178, + "forks": 176, "watchers": 952, "score": 0, "subscribers_count": 18 diff --git a/2020/CVE-2020-0041.json b/2020/CVE-2020-0041.json index 065dc4bfcc..c7f508af29 100644 --- a/2020/CVE-2020-0041.json +++ b/2020/CVE-2020-0041.json @@ -14,10 +14,10 @@ "description": "Exploits for Android Binder bug CVE-2020-0041", "fork": false, "created_at": "2020-03-31T17:53:57Z", - "updated_at": "2024-12-15T21:43:47Z", + "updated_at": "2024-12-16T11:17:13Z", "pushed_at": "2020-04-08T08:55:30Z", - "stargazers_count": 223, - "watchers_count": 223, + "stargazers_count": 224, + "watchers_count": 224, "has_discussions": false, "forks_count": 68, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 68, - "watchers": 223, + "watchers": 224, "score": 0, "subscribers_count": 11 }, diff --git a/2020/CVE-2020-0601.json b/2020/CVE-2020-0601.json index f2f3fd711a..a208b87099 100644 --- a/2020/CVE-2020-0601.json +++ b/2020/CVE-2020-0601.json @@ -179,7 +179,7 @@ "stargazers_count": 886, "watchers_count": 886, "has_discussions": false, - "forks_count": 268, + "forks_count": 265, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -187,7 +187,7 @@ "cve-2020-0601" ], "visibility": "public", - "forks": 268, + "forks": 265, "watchers": 886, "score": 0, "subscribers_count": 33 diff --git a/2020/CVE-2020-14144.json b/2020/CVE-2020-14144.json index 0e93f6f752..509b8799a3 100644 --- a/2020/CVE-2020-14144.json +++ b/2020/CVE-2020-14144.json @@ -14,10 +14,10 @@ "description": "A script to exploit CVE-2020-14144 - GiTea authenticated Remote Code Execution using git hooks", "fork": false, "created_at": "2022-03-08T17:14:27Z", - "updated_at": "2024-12-04T08:36:15Z", + "updated_at": "2024-12-16T08:35:04Z", "pushed_at": "2022-05-03T10:40:14Z", - "stargazers_count": 21, - "watchers_count": 21, + "stargazers_count": 22, + "watchers_count": 22, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 5, - "watchers": 21, + "watchers": 22, "score": 0, "subscribers_count": 2 } diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index b9193757ea..196309865c 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -981,10 +981,10 @@ "description": "tomcat自动化漏洞扫描利用工具,支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含", "fork": false, "created_at": "2024-08-29T06:38:16Z", - "updated_at": "2024-12-12T15:55:33Z", + "updated_at": "2024-12-16T09:11:32Z", "pushed_at": "2024-11-13T03:12:58Z", - "stargazers_count": 158, - "watchers_count": 158, + "stargazers_count": 159, + "watchers_count": 159, "has_discussions": false, "forks_count": 14, "allow_forking": true, @@ -1001,7 +1001,7 @@ ], "visibility": "public", "forks": 14, - "watchers": 158, + "watchers": 159, "score": 0, "subscribers_count": 2 } diff --git a/2020/CVE-2020-7471.json b/2020/CVE-2020-7471.json index f618b9fcdf..61c8b0bdb9 100644 --- a/2020/CVE-2020-7471.json +++ b/2020/CVE-2020-7471.json @@ -19,13 +19,13 @@ "stargazers_count": 104, "watchers_count": 104, "has_discussions": false, - "forks_count": 22, + "forks_count": 20, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 22, + "forks": 20, "watchers": 104, "score": 0, "subscribers_count": 2 diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json index bb71ce5911..0f82e99e50 100644 --- a/2021/CVE-2021-3129.json +++ b/2021/CVE-2021-3129.json @@ -14,10 +14,10 @@ "description": "Exploit for CVE-2021-3129", "fork": false, "created_at": "2021-01-13T12:52:20Z", - "updated_at": "2024-12-15T10:53:45Z", + "updated_at": "2024-12-16T08:15:29Z", "pushed_at": "2021-01-29T13:59:07Z", - "stargazers_count": 265, - "watchers_count": 265, + "stargazers_count": 266, + "watchers_count": 266, "has_discussions": false, "forks_count": 62, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 62, - "watchers": 265, + "watchers": 266, "score": 0, "subscribers_count": 14 }, diff --git a/2021/CVE-2021-3560.json b/2021/CVE-2021-3560.json index 07a8d27c37..a673a2f29c 100644 --- a/2021/CVE-2021-3560.json +++ b/2021/CVE-2021-3560.json @@ -45,10 +45,10 @@ "description": "CVE-2021-3560 Local PrivEsc Exploit", "fork": false, "created_at": "2021-06-11T14:28:43Z", - "updated_at": "2024-11-13T06:49:51Z", + "updated_at": "2024-12-16T06:53:41Z", "pushed_at": "2021-06-12T17:48:38Z", - "stargazers_count": 76, - "watchers_count": 76, + "stargazers_count": 77, + "watchers_count": 77, "has_discussions": false, "forks_count": 12, "allow_forking": true, @@ -63,7 +63,7 @@ ], "visibility": "public", "forks": 12, - "watchers": 76, + "watchers": 77, "score": 0, "subscribers_count": 3 }, @@ -147,10 +147,10 @@ "description": null, "fork": false, "created_at": "2021-06-14T20:08:20Z", - "updated_at": "2024-12-14T16:07:48Z", + "updated_at": "2024-12-16T08:03:45Z", "pushed_at": "2022-11-16T13:14:56Z", - "stargazers_count": 113, - "watchers_count": 113, + "stargazers_count": 114, + "watchers_count": 114, "has_discussions": false, "forks_count": 50, "allow_forking": true, @@ -159,7 +159,7 @@ "topics": [], "visibility": "public", "forks": 50, - "watchers": 113, + "watchers": 114, "score": 0, "subscribers_count": 1 }, @@ -209,10 +209,10 @@ "description": "Privilege escalation with polkit - CVE-2021-3560", "fork": false, "created_at": "2021-06-19T08:15:17Z", - "updated_at": "2024-11-26T22:44:38Z", + "updated_at": "2024-12-16T06:53:21Z", "pushed_at": "2021-06-20T07:38:13Z", - "stargazers_count": 116, - "watchers_count": 116, + "stargazers_count": 117, + "watchers_count": 117, "has_discussions": false, "forks_count": 50, "allow_forking": true, @@ -221,7 +221,7 @@ "topics": [], "visibility": "public", "forks": 50, - "watchers": 116, + "watchers": 117, "score": 0, "subscribers_count": 2 }, diff --git a/2021/CVE-2021-42321.json b/2021/CVE-2021-42321.json index caf6971757..9f12a0e9fb 100644 --- a/2021/CVE-2021-42321.json +++ b/2021/CVE-2021-42321.json @@ -91,36 +91,5 @@ "watchers": 9, "score": 0, "subscribers_count": 1 - }, - { - "id": 904036351, - "name": "exchange_tools", - "full_name": "gmeier909\/exchange_tools", - "owner": { - "login": "gmeier909", - "id": 38092939, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38092939?v=4", - "html_url": "https:\/\/github.com\/gmeier909", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/gmeier909\/exchange_tools", - "description": "将常用的cve工具做个备份(CVE-2021-42321,CVE-2022-23277,CVE-2022-41082,Exchange_GetVersion_MatchVul)", - "fork": false, - "created_at": "2024-12-16T06:08:45Z", - "updated_at": "2024-12-16T06:15:27Z", - "pushed_at": "2024-12-16T06:08:45Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 11782df61b..f6ad8f3611 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -10710,6 +10710,37 @@ "score": 0, "subscribers_count": 1 }, + { + "id": 447404470, + "name": "log4shell", + "full_name": "jxerome\/log4shell", + "owner": { + "login": "jxerome", + "id": 1355634, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1355634?v=4", + "html_url": "https:\/\/github.com\/jxerome", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/jxerome\/log4shell", + "description": "Démo du fonctionnement de log4shell (CVE-2021-44228)", + "fork": false, + "created_at": "2022-01-12T23:44:20Z", + "updated_at": "2022-01-12T23:59:13Z", + "pushed_at": "2022-01-14T14:03:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 2 + }, { "id": 447754863, "name": "log4j_github_repository", diff --git a/2022/CVE-2022-21445.json b/2022/CVE-2022-21445.json index c6a0929976..67ee1c46c8 100644 --- a/2022/CVE-2022-21445.json +++ b/2022/CVE-2022-21445.json @@ -45,10 +45,10 @@ "description": null, "fork": false, "created_at": "2024-03-12T04:47:02Z", - "updated_at": "2024-10-30T07:27:51Z", + "updated_at": "2024-12-16T06:53:25Z", "pushed_at": "2024-03-18T07:32:24Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2022/CVE-2022-23277.json b/2022/CVE-2022-23277.json index 1ee74cdaf5..7a39bd5a3a 100644 --- a/2022/CVE-2022-23277.json +++ b/2022/CVE-2022-23277.json @@ -29,36 +29,5 @@ "watchers": 9, "score": 0, "subscribers_count": 1 - }, - { - "id": 904036351, - "name": "exchange_tools", - "full_name": "gmeier909\/exchange_tools", - "owner": { - "login": "gmeier909", - "id": 38092939, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38092939?v=4", - "html_url": "https:\/\/github.com\/gmeier909", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/gmeier909\/exchange_tools", - "description": "将常用的cve工具做个备份(CVE-2021-42321,CVE-2022-23277,CVE-2022-41082,Exchange_GetVersion_MatchVul)", - "fork": false, - "created_at": "2024-12-16T06:08:45Z", - "updated_at": "2024-12-16T06:20:04Z", - "pushed_at": "2024-12-16T06:19:59Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-22515.json b/2023/CVE-2023-22515.json index 64af7130bf..bfde6f6ee4 100644 --- a/2023/CVE-2023-22515.json +++ b/2023/CVE-2023-22515.json @@ -786,8 +786,8 @@ }, { "id": 831810309, - "name": "CVE-2023-22515", - "full_name": "Onedy1703\/CVE-2023-22515", + "name": "CVE-2023-22515-Confluence", + "full_name": "Onedy1703\/CVE-2023-22515-Confluence", "owner": { "login": "Onedy1703", "id": 74649794, @@ -795,12 +795,12 @@ "html_url": "https:\/\/github.com\/Onedy1703", "user_view_type": "public" }, - "html_url": "https:\/\/github.com\/Onedy1703\/CVE-2023-22515", + "html_url": "https:\/\/github.com\/Onedy1703\/CVE-2023-22515-Confluence", "description": "CVE 2023-22515", "fork": false, "created_at": "2024-07-21T17:19:36Z", - "updated_at": "2024-12-14T09:44:02Z", - "pushed_at": "2024-12-14T09:43:59Z", + "updated_at": "2024-12-16T10:14:30Z", + "pushed_at": "2024-12-16T10:13:52Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2023/CVE-2023-23752.json b/2023/CVE-2023-23752.json index e0a8f1b8ec..b13d15f6e4 100644 --- a/2023/CVE-2023-23752.json +++ b/2023/CVE-2023-23752.json @@ -421,10 +421,10 @@ "description": "Joomla! < 4.2.8 - Unauthenticated information disclosure", "fork": false, "created_at": "2023-03-24T11:50:16Z", - "updated_at": "2024-12-09T18:18:44Z", + "updated_at": "2024-12-16T11:33:42Z", "pushed_at": "2023-12-27T11:30:46Z", - "stargazers_count": 79, - "watchers_count": 79, + "stargazers_count": 80, + "watchers_count": 80, "has_discussions": false, "forks_count": 17, "allow_forking": true, @@ -440,7 +440,7 @@ ], "visibility": "public", "forks": 17, - "watchers": 79, + "watchers": 80, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-25157.json b/2023/CVE-2023-25157.json index e9c732f0dc..5a02f5f37b 100644 --- a/2023/CVE-2023-25157.json +++ b/2023/CVE-2023-25157.json @@ -19,13 +19,13 @@ "stargazers_count": 166, "watchers_count": 166, "has_discussions": false, - "forks_count": 33, + "forks_count": 35, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 33, + "forks": 35, "watchers": 166, "score": 0, "subscribers_count": 2 diff --git a/2023/CVE-2023-38709.json b/2023/CVE-2023-38709.json index 7ba1775be2..2e48254200 100644 --- a/2023/CVE-2023-38709.json +++ b/2023/CVE-2023-38709.json @@ -14,10 +14,10 @@ "description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709", "fork": false, "created_at": "2024-10-05T20:32:45Z", - "updated_at": "2024-12-16T06:15:44Z", + "updated_at": "2024-12-16T09:57:04Z", "pushed_at": "2024-10-05T20:37:02Z", - "stargazers_count": 27, - "watchers_count": 27, + "stargazers_count": 31, + "watchers_count": 31, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -37,7 +37,7 @@ ], "visibility": "public", "forks": 6, - "watchers": 27, + "watchers": 31, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-40028.json b/2023/CVE-2023-40028.json index 447dfb97ef..b6309eef5d 100644 --- a/2023/CVE-2023-40028.json +++ b/2023/CVE-2023-40028.json @@ -76,10 +76,10 @@ "description": "CVE-2023-40028 affects Ghost, an open source content management system, where versions prior to 5.59.1 allow authenticated users to upload files that are symlinks. This can be exploited to perform an arbitrary file read of any file on the host operating system.", "fork": false, "created_at": "2024-12-12T18:50:58Z", - "updated_at": "2024-12-12T19:30:34Z", + "updated_at": "2024-12-16T12:14:04Z", "pushed_at": "2024-12-12T19:30:30Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-44976.json b/2023/CVE-2023-44976.json index 8826eeda97..efd1977d9c 100644 --- a/2023/CVE-2023-44976.json +++ b/2023/CVE-2023-44976.json @@ -19,13 +19,13 @@ "stargazers_count": 89, "watchers_count": 89, "has_discussions": false, - "forks_count": 19, + "forks_count": 20, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 19, + "forks": 20, "watchers": 89, "score": 0, "subscribers_count": 2 diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index 0ad76d3f68..bbfaddd94a 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -14,10 +14,10 @@ "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "fork": false, "created_at": "2024-01-16T06:52:02Z", - "updated_at": "2024-12-15T18:10:45Z", + "updated_at": "2024-12-16T12:18:00Z", "pushed_at": "2024-08-18T08:26:46Z", - "stargazers_count": 1293, - "watchers_count": 1293, + "stargazers_count": 1295, + "watchers_count": 1295, "has_discussions": false, "forks_count": 221, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 221, - "watchers": 1293, + "watchers": 1295, "score": 0, "subscribers_count": 21 }, diff --git a/2024/CVE-2024-0044.json b/2024/CVE-2024-0044.json index 504fcdfb7e..73fedcd642 100644 --- a/2024/CVE-2024-0044.json +++ b/2024/CVE-2024-0044.json @@ -262,10 +262,10 @@ "description": "CVE-2024-0044", "fork": false, "created_at": "2024-08-19T02:51:14Z", - "updated_at": "2024-11-12T16:04:10Z", + "updated_at": "2024-12-16T07:45:51Z", "pushed_at": "2024-08-24T06:32:58Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -278,7 +278,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-0582.json b/2024/CVE-2024-0582.json index e7bb52b963..e25924aebc 100644 --- a/2024/CVE-2024-0582.json +++ b/2024/CVE-2024-0582.json @@ -166,6 +166,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-10220.json b/2024/CVE-2024-10220.json index a24776d671..80a3dc0922 100644 --- a/2024/CVE-2024-10220.json +++ b/2024/CVE-2024-10220.json @@ -121,6 +121,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-10914.json b/2024/CVE-2024-10914.json index 76baa4f424..415e59a4a2 100644 --- a/2024/CVE-2024-10914.json +++ b/2024/CVE-2024-10914.json @@ -146,8 +146,8 @@ "description": "CVE-2024-10914 is a critical command injection vulnerability affecting several legacy D-Link Network Attached Storage (NAS) devices.", "fork": false, "created_at": "2024-11-16T16:32:05Z", - "updated_at": "2024-12-15T15:57:26Z", - "pushed_at": "2024-12-15T15:57:22Z", + "updated_at": "2024-12-16T11:58:05Z", + "pushed_at": "2024-12-16T11:58:00Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, diff --git a/2024/CVE-2024-11477.json b/2024/CVE-2024-11477.json index e052be8cdd..f65e5383ed 100644 --- a/2024/CVE-2024-11477.json +++ b/2024/CVE-2024-11477.json @@ -14,10 +14,10 @@ "description": "CVE-2024-11477 7Zip Code Execution Writeup and Analysis", "fork": false, "created_at": "2024-11-29T06:13:36Z", - "updated_at": "2024-12-13T16:00:43Z", + "updated_at": "2024-12-16T11:32:15Z", "pushed_at": "2024-12-04T01:01:28Z", - "stargazers_count": 44, - "watchers_count": 44, + "stargazers_count": 45, + "watchers_count": 45, "has_discussions": false, "forks_count": 10, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 10, - "watchers": 44, + "watchers": 45, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-11680.json b/2024/CVE-2024-11680.json index 4cf7dd3c39..eb2efdeffd 100644 --- a/2024/CVE-2024-11680.json +++ b/2024/CVE-2024-11680.json @@ -14,10 +14,10 @@ "description": "This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older versions. The exploit targets a Cross-Site Request Forgery (CSRF) flaw in combination with Privilege Misconfiguration issues.", "fork": false, "created_at": "2024-12-04T18:42:43Z", - "updated_at": "2024-12-15T23:55:02Z", + "updated_at": "2024-12-16T10:01:06Z", "pushed_at": "2024-12-11T23:45:31Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 12, + "watchers_count": 12, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 10, + "watchers": 12, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-11972.json b/2024/CVE-2024-11972.json index 1771f71ebc..030b5e5736 100644 --- a/2024/CVE-2024-11972.json +++ b/2024/CVE-2024-11972.json @@ -11,11 +11,11 @@ "user_view_type": "public" }, "html_url": "https:\/\/github.com\/JunTakemura\/exploit-CVE-2024-11972", - "description": "Exploit for CVE-2024-11972, Hunk Companion < 1.9.0 Unauthorized Plugin Installation", + "description": "Exploit for CVE-2024-11972, Hunk Companion < 1.9.0 Unauthenticated Plugin Installation", "fork": false, "created_at": "2024-12-15T23:54:15Z", - "updated_at": "2024-12-16T02:13:42Z", - "pushed_at": "2024-12-16T02:13:39Z", + "updated_at": "2024-12-16T11:22:09Z", + "pushed_at": "2024-12-16T10:06:26Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, @@ -28,6 +28,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-21306.json b/2024/CVE-2024-21306.json index 68033b858a..7cec0871a6 100644 --- a/2024/CVE-2024-21306.json +++ b/2024/CVE-2024-21306.json @@ -90,6 +90,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-21542.json b/2024/CVE-2024-21542.json index 5b0255cc2d..5d1121477b 100644 --- a/2024/CVE-2024-21542.json +++ b/2024/CVE-2024-21542.json @@ -28,6 +28,6 @@ "forks": 0, "watchers": 1, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-26229.json b/2024/CVE-2024-26229.json index 7236aabbc5..1d8f7b6cbf 100644 --- a/2024/CVE-2024-26229.json +++ b/2024/CVE-2024-26229.json @@ -45,10 +45,10 @@ "description": "Windows LPE", "fork": false, "created_at": "2024-06-11T08:03:29Z", - "updated_at": "2024-12-12T23:45:20Z", + "updated_at": "2024-12-16T10:12:29Z", "pushed_at": "2024-06-11T20:41:59Z", - "stargazers_count": 109, - "watchers_count": 109, + "stargazers_count": 110, + "watchers_count": 110, "has_discussions": false, "forks_count": 23, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 23, - "watchers": 109, + "watchers": 110, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-2961.json b/2024/CVE-2024-2961.json index d05a66cee9..7eb315b6eb 100644 --- a/2024/CVE-2024-2961.json +++ b/2024/CVE-2024-2961.json @@ -76,10 +76,10 @@ "description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()", "fork": false, "created_at": "2024-05-27T08:30:06Z", - "updated_at": "2024-12-06T09:50:30Z", + "updated_at": "2024-12-16T10:41:35Z", "pushed_at": "2024-09-30T08:45:56Z", - "stargazers_count": 423, - "watchers_count": 423, + "stargazers_count": 424, + "watchers_count": 424, "has_discussions": false, "forks_count": 52, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 52, - "watchers": 423, + "watchers": 424, "score": 0, "subscribers_count": 8 }, diff --git a/2024/CVE-2024-38193.json b/2024/CVE-2024-38193.json index 8ccd00e994..820d924dce 100644 --- a/2024/CVE-2024-38193.json +++ b/2024/CVE-2024-38193.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2024-12-03T08:56:59Z", - "updated_at": "2024-12-16T05:49:36Z", + "updated_at": "2024-12-16T08:25:05Z", "pushed_at": "2024-11-18T23:48:31Z", - "stargazers_count": 40, - "watchers_count": 40, + "stargazers_count": 41, + "watchers_count": 41, "has_discussions": false, "forks_count": 24, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 24, - "watchers": 40, + "watchers": 41, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-38472.json b/2024/CVE-2024-38472.json index fc3094512c..d8780ea1d8 100644 --- a/2024/CVE-2024-38472.json +++ b/2024/CVE-2024-38472.json @@ -45,10 +45,10 @@ "description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709", "fork": false, "created_at": "2024-10-05T20:32:45Z", - "updated_at": "2024-12-16T06:15:44Z", + "updated_at": "2024-12-16T09:57:04Z", "pushed_at": "2024-10-05T20:37:02Z", - "stargazers_count": 27, - "watchers_count": 27, + "stargazers_count": 31, + "watchers_count": 31, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -68,7 +68,7 @@ ], "visibility": "public", "forks": 6, - "watchers": 27, + "watchers": 31, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-38819.json b/2024/CVE-2024-38819.json index 2da14c0869..72be74c8f5 100644 --- a/2024/CVE-2024-38819.json +++ b/2024/CVE-2024-38819.json @@ -14,20 +14,51 @@ "description": null, "fork": false, "created_at": "2024-12-14T09:22:33Z", - "updated_at": "2024-12-16T06:27:58Z", + "updated_at": "2024-12-16T11:37:07Z", "pushed_at": "2024-12-14T10:13:45Z", - "stargazers_count": 13, - "watchers_count": 13, + "stargazers_count": 16, + "watchers_count": 16, "has_discussions": false, - "forks_count": 3, + "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 3, - "watchers": 13, + "forks": 5, + "watchers": 16, "score": 0, "subscribers_count": 2 + }, + { + "id": 904096436, + "name": "CVE-2024-38819", + "full_name": "GhostS3c\/CVE-2024-38819", + "owner": { + "login": "GhostS3c", + "id": 190174780, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/190174780?v=4", + "html_url": "https:\/\/github.com\/GhostS3c", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/GhostS3c\/CVE-2024-38819", + "description": "CVE-2024-38819 nuclei template", + "fork": false, + "created_at": "2024-12-16T08:48:12Z", + "updated_at": "2024-12-16T10:35:29Z", + "pushed_at": "2024-12-16T08:49:02Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-44193.json b/2024/CVE-2024-44193.json index 707058e4e5..3d361f91d0 100644 --- a/2024/CVE-2024-44193.json +++ b/2024/CVE-2024-44193.json @@ -19,13 +19,13 @@ "stargazers_count": 94, "watchers_count": 94, "has_discussions": false, - "forks_count": 12, + "forks_count": 13, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 12, + "forks": 13, "watchers": 94, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-4577.json b/2024/CVE-2024-4577.json index b85030daec..77f9017db9 100644 --- a/2024/CVE-2024-4577.json +++ b/2024/CVE-2024-4577.json @@ -548,10 +548,10 @@ "description": "[漏洞复现] 全球首款利用PHP默认环境(XAMPP)的CVE-2024-4577 PHP-CGI RCE 漏洞 EXP。", "fork": false, "created_at": "2024-06-08T13:04:45Z", - "updated_at": "2024-12-15T01:59:47Z", + "updated_at": "2024-12-16T09:28:01Z", "pushed_at": "2024-07-21T20:27:03Z", - "stargazers_count": 126, - "watchers_count": 126, + "stargazers_count": 127, + "watchers_count": 127, "has_discussions": false, "forks_count": 31, "allow_forking": true, @@ -560,7 +560,7 @@ "topics": [], "visibility": "public", "forks": 31, - "watchers": 126, + "watchers": 127, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-4956.json b/2024/CVE-2024-4956.json index 4265703ec0..74c15ea7dd 100644 --- a/2024/CVE-2024-4956.json +++ b/2024/CVE-2024-4956.json @@ -415,7 +415,7 @@ "stargazers_count": 13, "watchers_count": 13, "has_discussions": false, - "forks_count": 5, + "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -425,7 +425,7 @@ "unauthenticated-path-traversal" ], "visibility": "public", - "forks": 5, + "forks": 6, "watchers": 13, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-53376.json b/2024/CVE-2024-53376.json index 00394c30ed..f37eec08ed 100644 --- a/2024/CVE-2024-53376.json +++ b/2024/CVE-2024-53376.json @@ -28,6 +28,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-53677.json b/2024/CVE-2024-53677.json index 4654bcbd59..274c168141 100644 --- a/2024/CVE-2024-53677.json +++ b/2024/CVE-2024-53677.json @@ -28,7 +28,7 @@ "forks": 2, "watchers": 3, "score": 0, - "subscribers_count": 2 + "subscribers_count": 3 }, { "id": 902994077, @@ -45,19 +45,19 @@ "description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.", "fork": false, "created_at": "2024-12-13T17:42:55Z", - "updated_at": "2024-12-16T06:17:00Z", - "pushed_at": "2024-12-16T06:16:56Z", - "stargazers_count": 6, - "watchers_count": 6, + "updated_at": "2024-12-16T12:06:11Z", + "pushed_at": "2024-12-16T09:23:33Z", + "stargazers_count": 8, + "watchers_count": 8, "has_discussions": false, - "forks_count": 1, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, - "watchers": 6, + "forks": 4, + "watchers": 8, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-55557.json b/2024/CVE-2024-55557.json index 3ed3d3d9c8..87773b3698 100644 --- a/2024/CVE-2024-55557.json +++ b/2024/CVE-2024-55557.json @@ -28,6 +28,6 @@ "forks": 1, "watchers": 1, "score": 0, - "subscribers_count": 1 + "subscribers_count": 2 } ] \ No newline at end of file diff --git a/2024/CVE-2024-56115.json b/2024/CVE-2024-56115.json new file mode 100644 index 0000000000..e9238990d8 --- /dev/null +++ b/2024/CVE-2024-56115.json @@ -0,0 +1,33 @@ +[ + { + "id": 904071998, + "name": "CVE-2024-56115", + "full_name": "ComplianceControl\/CVE-2024-56115", + "owner": { + "login": "ComplianceControl", + "id": 188841575, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188841575?v=4", + "html_url": "https:\/\/github.com\/ComplianceControl", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/ComplianceControl\/CVE-2024-56115", + "description": null, + "fork": false, + "created_at": "2024-12-16T07:46:41Z", + "updated_at": "2024-12-16T07:47:09Z", + "pushed_at": "2024-12-16T07:47:05Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-56116.json b/2024/CVE-2024-56116.json new file mode 100644 index 0000000000..2059607bf3 --- /dev/null +++ b/2024/CVE-2024-56116.json @@ -0,0 +1,33 @@ +[ + { + "id": 904070943, + "name": "CVE-2024-56116", + "full_name": "ComplianceControl\/CVE-2024-56116", + "owner": { + "login": "ComplianceControl", + "id": 188841575, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188841575?v=4", + "html_url": "https:\/\/github.com\/ComplianceControl", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/ComplianceControl\/CVE-2024-56116", + "description": null, + "fork": false, + "created_at": "2024-12-16T07:44:07Z", + "updated_at": "2024-12-16T07:46:19Z", + "pushed_at": "2024-12-16T07:46:15Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-6387.json b/2024/CVE-2024-6387.json index ffea85073d..0f18c9e0a2 100644 --- a/2024/CVE-2024-6387.json +++ b/2024/CVE-2024-6387.json @@ -1378,7 +1378,7 @@ "forks": 27, "watchers": 65, "score": 0, - "subscribers_count": 1 + "subscribers_count": 2 }, { "id": 823291064, @@ -2180,10 +2180,10 @@ "description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)", "fork": false, "created_at": "2024-07-08T11:27:49Z", - "updated_at": "2024-12-15T09:26:49Z", + "updated_at": "2024-12-16T11:10:04Z", "pushed_at": "2024-08-22T08:50:25Z", - "stargazers_count": 59, - "watchers_count": 59, + "stargazers_count": 60, + "watchers_count": 60, "has_discussions": false, "forks_count": 23, "allow_forking": true, @@ -2192,9 +2192,9 @@ "topics": [], "visibility": "public", "forks": 23, - "watchers": 59, + "watchers": 60, "score": 0, - "subscribers_count": 2 + "subscribers_count": 3 }, { "id": 825734560, diff --git a/2024/CVE-2024-6778.json b/2024/CVE-2024-6778.json index 31b5773135..8922db4c3c 100644 --- a/2024/CVE-2024-6778.json +++ b/2024/CVE-2024-6778.json @@ -14,10 +14,10 @@ "description": "A POC exploit for CVE-2024-5836 and CVE-2024-6778, allowing for a sandbox escape from a Chrome extension. ", "fork": false, "created_at": "2024-09-10T06:27:59Z", - "updated_at": "2024-11-23T06:49:24Z", + "updated_at": "2024-12-16T08:03:54Z", "pushed_at": "2024-10-17T05:12:29Z", - "stargazers_count": 82, - "watchers_count": 82, + "stargazers_count": 83, + "watchers_count": 83, "has_discussions": false, "forks_count": 12, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 12, - "watchers": 82, + "watchers": 83, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-9474.json b/2024/CVE-2024-9474.json index 9e28d8657b..4d62dcf4b4 100644 --- a/2024/CVE-2024-9474.json +++ b/2024/CVE-2024-9474.json @@ -121,6 +121,6 @@ "forks": 1, "watchers": 2, "score": 0, - "subscribers_count": 1 + "subscribers_count": 2 } ] \ No newline at end of file diff --git a/README.md b/README.md index 49a86af0eb..40c9cdcfe0 100644 --- a/README.md +++ b/README.md @@ -5727,6 +5727,7 @@ ### CVE-2024-38819 - [masa42/CVE-2024-38819-POC](https://github.com/masa42/CVE-2024-38819-POC) +- [GhostS3c/CVE-2024-38819](https://github.com/GhostS3c/CVE-2024-38819) ### CVE-2024-38821 (2024-10-28) @@ -7442,7 +7443,7 @@ ### CVE-2024-53677 (2024-12-11) -File upload logic is flawed vulnerability in Apache Struts.\n\nThis issue affects Apache Struts: from 2.0.0 before 6.4.0.\n\nUsers are recommended to upgrade to version 6.4.0, which fixes the issue.\n\nYou can find more details in  https://cwiki.apache.org/confluence/display/WW/S2-067 +File upload logic is flawed vulnerability in Apache Struts.\n\nThis issue affects Apache Struts: from 2.0.0 before 6.4.0.\n\nUsers are recommended to upgrade to version 6.4.0 migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload .\n\nYou can find more details in  https://cwiki.apache.org/confluence/display/WW/S2-067 - [cloudwafs/s2-067-CVE-2024-53677](https://github.com/cloudwafs/s2-067-CVE-2024-53677) @@ -7479,6 +7480,12 @@ - [JAckLosingHeart/CVE-2024-55875](https://github.com/JAckLosingHeart/CVE-2024-55875) +### CVE-2024-56115 +- [ComplianceControl/CVE-2024-56115](https://github.com/ComplianceControl/CVE-2024-56115) + +### CVE-2024-56116 +- [ComplianceControl/CVE-2024-56116](https://github.com/ComplianceControl/CVE-2024-56116) + ### CVE-2024-1642470 - [Symbolexe/CVE-2024-1642470](https://github.com/Symbolexe/CVE-2024-1642470) @@ -9640,7 +9647,7 @@ - [s1d6point7bugcrowd/CVE-2023-22515-check](https://github.com/s1d6point7bugcrowd/CVE-2023-22515-check) - [xorbbo/cve-2023-22515](https://github.com/xorbbo/cve-2023-22515) - [spareack/CVE-2023-22515-NSE](https://github.com/spareack/CVE-2023-22515-NSE) -- [Onedy1703/CVE-2023-22515](https://github.com/Onedy1703/CVE-2023-22515) +- [Onedy1703/CVE-2023-22515-Confluence](https://github.com/Onedy1703/CVE-2023-22515-Confluence) ### CVE-2023-22518 (2023-10-31) @@ -18061,7 +18068,6 @@ - [7BitsTeam/CVE-2022-23277](https://github.com/7BitsTeam/CVE-2022-23277) -- [gmeier909/exchange_tools](https://github.com/gmeier909/exchange_tools) ### CVE-2022-23303 (2022-01-17) @@ -27925,7 +27931,6 @@ - [DarkSprings/CVE-2021-42321](https://github.com/DarkSprings/CVE-2021-42321) - [xnyuq/cve-2021-42321](https://github.com/xnyuq/cve-2021-42321) - [7BitsTeam/exch_CVE-2021-42321](https://github.com/7BitsTeam/exch_CVE-2021-42321) -- [gmeier909/exchange_tools](https://github.com/gmeier909/exchange_tools) ### CVE-2021-42325 (2021-10-12) @@ -28838,6 +28843,7 @@ - [Vulnmachines/log4jshell_CVE-2021-44228](https://github.com/Vulnmachines/log4jshell_CVE-2021-44228) - [mr-vill4in/log4j-fuzzer](https://github.com/mr-vill4in/log4j-fuzzer) - [mebibite/log4jhound](https://github.com/mebibite/log4jhound) +- [jxerome/log4shell](https://github.com/jxerome/log4shell) - [sdogancesur/log4j_github_repository](https://github.com/sdogancesur/log4j_github_repository) - [jrocia/Search-log4Jvuln-AppScanSTD](https://github.com/jrocia/Search-log4Jvuln-AppScanSTD) - [aajuvonen/log4stdin](https://github.com/aajuvonen/log4stdin) @@ -49454,7 +49460,7 @@ A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash.\n\nThis issue affects Apache HTTP Server 2.4.54 and earlier.\n -- [Saksham2002/CVE-2006-20001](https://github.com/Saksham2002/CVE-2006-20001) +- [r1az4r/CVE-2006-20001](https://github.com/r1az4r/CVE-2006-20001) ## 2005