From fd3fc18f8dad4b58037aff37a58f1c8ded010a8d Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Tue, 23 Apr 2024 15:28:22 +0900 Subject: [PATCH] Auto Update 2024/04/23 06:28:22 --- 2011/CVE-2011-2523.json | 30 ++++++++++++++++++++++++++++ 2018/CVE-2018-10933.json | 8 ++++---- 2018/CVE-2018-19320.json | 4 ++-- 2019/CVE-2019-2215.json | 8 ++++---- 2019/CVE-2019-9053.json | 4 ++-- 2020/CVE-2020-3452.json | 8 ++++---- 2022/CVE-2022-0482.json | 2 +- 2022/CVE-2022-26134.json | 12 ++++++------ 2022/CVE-2022-38694.json | 12 ++++++------ 2022/CVE-2022-39197.json | 8 ++++---- 2023/CVE-2023-0386.json | 30 ++++++++++++++++++++++++++++ 2023/CVE-2023-20198.json | 2 +- 2023/CVE-2023-20963.json | 2 +- 2023/CVE-2023-2640.json | 8 ++++---- 2023/CVE-2023-29489.json | 4 ++-- 2023/CVE-2023-32233.json | 8 ++++---- 2023/CVE-2023-33733.json | 2 +- 2023/CVE-2023-42793.json | 12 ++++++------ 2023/CVE-2023-44487.json | 2 +- 2023/CVE-2023-45866.json | 10 +++++----- 2023/CVE-2023-48788.json | 8 ++++---- 2023/CVE-2023-6319.json | 2 +- 2024/CVE-2024-0582.json | 2 +- 2024/CVE-2024-1086.json | 8 ++++---- 2024/CVE-2024-20356.json | 8 ++++---- 2024/CVE-2024-21111.json | 14 +++++++------- 2024/CVE-2024-21338.json | 8 ++++---- 2024/CVE-2024-21626.json | 2 +- 2024/CVE-2024-24576.json | 2 +- 2024/CVE-2024-27199.json | 2 +- 2024/CVE-2024-29296.json | 8 ++++---- 2024/CVE-2024-31497.json | 4 ++-- 2024/CVE-2024-32399.json | 2 +- 2024/CVE-2024-3273.json | 30 ++++++++++++++++++++++++++++ 2024/CVE-2024-3400.json | 42 ++++++++++++++++++++-------------------- 2024/CVE-2024-4040.json | 2 +- README.md | 3 +++ 37 files changed, 208 insertions(+), 115 deletions(-) diff --git a/2011/CVE-2011-2523.json b/2011/CVE-2011-2523.json index f3b84463c5..8e5810d90b 100644 --- a/2011/CVE-2011-2523.json +++ b/2011/CVE-2011-2523.json @@ -441,5 +441,35 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 790562403, + "name": "SmileySploit", + "full_name": "Tenor-Z\/SmileySploit", + "owner": { + "login": "Tenor-Z", + "id": 55516164, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55516164?v=4", + "html_url": "https:\/\/github.com\/Tenor-Z" + }, + "html_url": "https:\/\/github.com\/Tenor-Z\/SmileySploit", + "description": "A basic script that exploits CVE-2011-2523", + "fork": false, + "created_at": "2024-04-23T05:33:39Z", + "updated_at": "2024-04-23T05:36:57Z", + "pushed_at": "2024-04-23T05:36:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-10933.json b/2018/CVE-2018-10933.json index 34383717e5..619a8b7f8b 100644 --- a/2018/CVE-2018-10933.json +++ b/2018/CVE-2018-10933.json @@ -43,10 +43,10 @@ "description": "Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)", "fork": false, "created_at": "2018-10-17T14:14:12Z", - "updated_at": "2024-02-29T19:32:54Z", + "updated_at": "2024-04-23T03:40:37Z", "pushed_at": "2023-12-19T20:46:55Z", - "stargazers_count": 495, - "watchers_count": 495, + "stargazers_count": 496, + "watchers_count": 496, "has_discussions": false, "forks_count": 121, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 121, - "watchers": 495, + "watchers": 496, "score": 0, "subscribers_count": 22 }, diff --git a/2018/CVE-2018-19320.json b/2018/CVE-2018-19320.json index 5a5b8ef2f0..6419138b78 100644 --- a/2018/CVE-2018-19320.json +++ b/2018/CVE-2018-19320.json @@ -78,13 +78,13 @@ "stargazers_count": 145, "watchers_count": 145, "has_discussions": false, - "forks_count": 40, + "forks_count": 41, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 40, + "forks": 41, "watchers": 145, "score": 0, "subscribers_count": 6 diff --git a/2019/CVE-2019-2215.json b/2019/CVE-2019-2215.json index 88b17061b6..5121ea4039 100644 --- a/2019/CVE-2019-2215.json +++ b/2019/CVE-2019-2215.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2019-10-04T06:32:08Z", - "updated_at": "2024-03-23T16:06:48Z", + "updated_at": "2024-04-23T01:01:45Z", "pushed_at": "2019-11-12T03:58:00Z", - "stargazers_count": 71, - "watchers_count": 71, + "stargazers_count": 72, + "watchers_count": 72, "has_discussions": false, "forks_count": 32, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 32, - "watchers": 71, + "watchers": 72, "score": 0, "subscribers_count": 9 }, diff --git a/2019/CVE-2019-9053.json b/2019/CVE-2019-9053.json index 852168cebe..c605a478e3 100644 --- a/2019/CVE-2019-9053.json +++ b/2019/CVE-2019-9053.json @@ -258,13 +258,13 @@ "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 4, + "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 4, + "forks": 3, "watchers": 0, "score": 0, "subscribers_count": 1 diff --git a/2020/CVE-2020-3452.json b/2020/CVE-2020-3452.json index 518831d188..a2f55c6c01 100644 --- a/2020/CVE-2020-3452.json +++ b/2020/CVE-2020-3452.json @@ -318,10 +318,10 @@ "description": "Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.", "fork": false, "created_at": "2020-09-28T05:00:37Z", - "updated_at": "2024-03-28T20:15:12Z", + "updated_at": "2024-04-23T00:56:24Z", "pushed_at": "2020-10-10T17:19:51Z", - "stargazers_count": 23, - "watchers_count": 23, + "stargazers_count": 24, + "watchers_count": 24, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -339,7 +339,7 @@ ], "visibility": "public", "forks": 11, - "watchers": 23, + "watchers": 24, "score": 0, "subscribers_count": 2 }, diff --git a/2022/CVE-2022-0482.json b/2022/CVE-2022-0482.json index 5c96052b36..610ea5887b 100644 --- a/2022/CVE-2022-0482.json +++ b/2022/CVE-2022-0482.json @@ -63,6 +63,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index 337f2b811a..71a8a5b3c0 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -13,12 +13,12 @@ "description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。", "fork": false, "created_at": "2022-05-31T07:44:01Z", - "updated_at": "2024-04-22T14:04:41Z", + "updated_at": "2024-04-23T06:09:59Z", "pushed_at": "2023-02-26T14:06:05Z", - "stargazers_count": 1129, - "watchers_count": 1129, + "stargazers_count": 1130, + "watchers_count": 1130, "has_discussions": true, - "forks_count": 187, + "forks_count": 188, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -44,8 +44,8 @@ "gui" ], "visibility": "public", - "forks": 187, - "watchers": 1129, + "forks": 188, + "watchers": 1130, "score": 0, "subscribers_count": 18 }, diff --git a/2022/CVE-2022-38694.json b/2022/CVE-2022-38694.json index 6f10e26d5d..76f2f516de 100644 --- a/2022/CVE-2022-38694.json +++ b/2022/CVE-2022-38694.json @@ -13,12 +13,12 @@ "description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692", "fork": false, "created_at": "2023-06-10T08:31:26Z", - "updated_at": "2024-04-22T15:49:33Z", + "updated_at": "2024-04-23T01:44:52Z", "pushed_at": "2024-04-05T06:46:47Z", - "stargazers_count": 198, - "watchers_count": 198, + "stargazers_count": 199, + "watchers_count": 199, "has_discussions": true, - "forks_count": 23, + "forks_count": 25, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -27,8 +27,8 @@ "unisoc" ], "visibility": "public", - "forks": 23, - "watchers": 198, + "forks": 25, + "watchers": 199, "score": 0, "subscribers_count": 6 } diff --git a/2022/CVE-2022-39197.json b/2022/CVE-2022-39197.json index b09a5e2aed..e56e8d97bb 100644 --- a/2022/CVE-2022-39197.json +++ b/2022/CVE-2022-39197.json @@ -227,10 +227,10 @@ "description": "CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. ", "fork": false, "created_at": "2022-09-26T08:58:21Z", - "updated_at": "2024-04-12T11:36:33Z", + "updated_at": "2024-04-23T03:10:44Z", "pushed_at": "2022-09-26T13:20:38Z", - "stargazers_count": 303, - "watchers_count": 303, + "stargazers_count": 304, + "watchers_count": 304, "has_discussions": false, "forks_count": 46, "allow_forking": true, @@ -243,7 +243,7 @@ ], "visibility": "public", "forks": 46, - "watchers": 303, + "watchers": 304, "score": 0, "subscribers_count": 5 }, diff --git a/2023/CVE-2023-0386.json b/2023/CVE-2023-0386.json index c76ce014f8..152aefc149 100644 --- a/2023/CVE-2023-0386.json +++ b/2023/CVE-2023-0386.json @@ -330,5 +330,35 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 790464197, + "name": "CVE-2023-0386-libs", + "full_name": "EstamelGG\/CVE-2023-0386-libs", + "owner": { + "login": "EstamelGG", + "id": 46676047, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46676047?v=4", + "html_url": "https:\/\/github.com\/EstamelGG" + }, + "html_url": "https:\/\/github.com\/EstamelGG\/CVE-2023-0386-libs", + "description": "CVE-2023-0386 包含所需运行库", + "fork": false, + "created_at": "2024-04-22T23:33:35Z", + "updated_at": "2024-04-23T04:29:41Z", + "pushed_at": "2024-04-23T04:29:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-20198.json b/2023/CVE-2023-20198.json index 2a8ba1c6e4..023f0df3ae 100644 --- a/2023/CVE-2023-20198.json +++ b/2023/CVE-2023-20198.json @@ -147,7 +147,7 @@ "forks": 11, "watchers": 30, "score": 0, - "subscribers_count": 2 + "subscribers_count": 3 }, { "id": 706567964, diff --git a/2023/CVE-2023-20963.json b/2023/CVE-2023-20963.json index 7aea9127a1..290980a222 100644 --- a/2023/CVE-2023-20963.json +++ b/2023/CVE-2023-20963.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2023-06-12T10:44:59Z", "updated_at": "2024-04-19T05:52:38Z", - "pushed_at": "2024-04-12T18:23:49Z", + "pushed_at": "2024-04-23T05:44:07Z", "stargazers_count": 34, "watchers_count": 34, "has_discussions": false, diff --git a/2023/CVE-2023-2640.json b/2023/CVE-2023-2640.json index c6d7901e6d..c65cbdb26a 100644 --- a/2023/CVE-2023-2640.json +++ b/2023/CVE-2023-2640.json @@ -73,10 +73,10 @@ "description": "GameOver(lay) Ubuntu Privilege Escalation", "fork": false, "created_at": "2023-10-09T22:02:42Z", - "updated_at": "2024-04-12T04:08:39Z", + "updated_at": "2024-04-23T02:34:53Z", "pushed_at": "2023-10-09T22:44:21Z", - "stargazers_count": 98, - "watchers_count": 98, + "stargazers_count": 99, + "watchers_count": 99, "has_discussions": false, "forks_count": 18, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 18, - "watchers": 98, + "watchers": 99, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-29489.json b/2023/CVE-2023-29489.json index 1a675978c6..31bc76f6ef 100644 --- a/2023/CVE-2023-29489.json +++ b/2023/CVE-2023-29489.json @@ -563,8 +563,8 @@ "description": "An issue was discovered in cPanel before 11.109.9999.116. Cross-Site Scripting can occur on the cpsrvd error page via an invalid webcall ID.", "fork": false, "created_at": "2024-04-21T12:26:22Z", - "updated_at": "2024-04-21T13:50:09Z", - "pushed_at": "2024-04-21T13:50:05Z", + "updated_at": "2024-04-23T05:24:47Z", + "pushed_at": "2024-04-23T05:24:44Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2023/CVE-2023-32233.json b/2023/CVE-2023-32233.json index 393f2c0f80..d7bfedc4c4 100644 --- a/2023/CVE-2023-32233.json +++ b/2023/CVE-2023-32233.json @@ -73,10 +73,10 @@ "description": "Use-After-Free in Netfilter nf_tables when processing batch requests CVE-2023-32233", "fork": false, "created_at": "2023-05-16T05:58:03Z", - "updated_at": "2024-04-18T10:35:12Z", + "updated_at": "2024-04-23T02:58:15Z", "pushed_at": "2023-06-20T06:58:04Z", - "stargazers_count": 47, - "watchers_count": 47, + "stargazers_count": 48, + "watchers_count": 48, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 47, + "watchers": 48, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-33733.json b/2023/CVE-2023-33733.json index 94112fe2bb..17e738a1be 100644 --- a/2023/CVE-2023-33733.json +++ b/2023/CVE-2023-33733.json @@ -87,6 +87,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-42793.json b/2023/CVE-2023-42793.json index 7cb24281cc..ed706b45cf 100644 --- a/2023/CVE-2023-42793.json +++ b/2023/CVE-2023-42793.json @@ -13,12 +13,12 @@ "description": "JetBrains TeamCity Authentication Bypass CVE-2023-42793 Exploit", "fork": false, "created_at": "2023-09-29T06:43:35Z", - "updated_at": "2024-04-22T09:03:59Z", + "updated_at": "2024-04-23T02:48:36Z", "pushed_at": "2023-12-14T06:07:44Z", - "stargazers_count": 30, - "watchers_count": 30, + "stargazers_count": 32, + "watchers_count": 32, "has_discussions": false, - "forks_count": 8, + "forks_count": 9, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -29,8 +29,8 @@ "teamcity" ], "visibility": "public", - "forks": 8, - "watchers": 30, + "forks": 9, + "watchers": 32, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-44487.json b/2023/CVE-2023-44487.json index 021e671504..7d1ceaf816 100644 --- a/2023/CVE-2023-44487.json +++ b/2023/CVE-2023-44487.json @@ -393,6 +393,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index b851b9e9fd..44296866a2 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -13,10 +13,10 @@ "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "fork": false, "created_at": "2024-01-16T06:52:02Z", - "updated_at": "2024-04-22T18:01:28Z", + "updated_at": "2024-04-23T02:08:12Z", "pushed_at": "2024-04-08T13:43:21Z", - "stargazers_count": 418, - "watchers_count": 418, + "stargazers_count": 420, + "watchers_count": 420, "has_discussions": false, "forks_count": 66, "allow_forking": true, @@ -25,9 +25,9 @@ "topics": [], "visibility": "public", "forks": 66, - "watchers": 418, + "watchers": 420, "score": 0, - "subscribers_count": 7 + "subscribers_count": 8 }, { "id": 743886715, diff --git a/2023/CVE-2023-48788.json b/2023/CVE-2023-48788.json index ebf3e5edcf..1643c7d5eb 100644 --- a/2023/CVE-2023-48788.json +++ b/2023/CVE-2023-48788.json @@ -13,10 +13,10 @@ "description": "Fortinet FortiClient EMS SQL Injection", "fork": false, "created_at": "2024-03-18T20:50:48Z", - "updated_at": "2024-04-19T10:59:53Z", + "updated_at": "2024-04-23T02:36:56Z", "pushed_at": "2024-03-20T20:42:41Z", - "stargazers_count": 36, - "watchers_count": 36, + "stargazers_count": 37, + "watchers_count": 37, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 36, + "watchers": 37, "score": 0, "subscribers_count": 5 }, diff --git a/2023/CVE-2023-6319.json b/2023/CVE-2023-6319.json index cf798a84ff..5c712639a1 100644 --- a/2023/CVE-2023-6319.json +++ b/2023/CVE-2023-6319.json @@ -27,6 +27,6 @@ "forks": 2, "watchers": 21, "score": 0, - "subscribers_count": 3 + "subscribers_count": 4 } ] \ No newline at end of file diff --git a/2024/CVE-2024-0582.json b/2024/CVE-2024-0582.json index 3311965c75..e1047851e6 100644 --- a/2024/CVE-2024-0582.json +++ b/2024/CVE-2024-0582.json @@ -27,7 +27,7 @@ "forks": 21, "watchers": 73, "score": 0, - "subscribers_count": 3 + "subscribers_count": 4 }, { "id": 782584156, diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json index 1caba9732a..b801e19ba9 100644 --- a/2024/CVE-2024-1086.json +++ b/2024/CVE-2024-1086.json @@ -13,10 +13,10 @@ "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.", "fork": false, "created_at": "2024-03-20T21:16:41Z", - "updated_at": "2024-04-22T18:39:04Z", + "updated_at": "2024-04-23T06:08:08Z", "pushed_at": "2024-04-17T16:09:54Z", - "stargazers_count": 1873, - "watchers_count": 1873, + "stargazers_count": 1875, + "watchers_count": 1875, "has_discussions": false, "forks_count": 232, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 232, - "watchers": 1873, + "watchers": 1875, "score": 0, "subscribers_count": 19 }, diff --git a/2024/CVE-2024-20356.json b/2024/CVE-2024-20356.json index 3bf2ce7e6e..9044ef668e 100644 --- a/2024/CVE-2024-20356.json +++ b/2024/CVE-2024-20356.json @@ -13,10 +13,10 @@ "description": "This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.", "fork": false, "created_at": "2024-04-12T15:07:42Z", - "updated_at": "2024-04-22T19:15:35Z", + "updated_at": "2024-04-23T05:34:36Z", "pushed_at": "2024-04-18T14:31:34Z", - "stargazers_count": 26, - "watchers_count": 26, + "stargazers_count": 28, + "watchers_count": 28, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 7, - "watchers": 26, + "watchers": 28, "score": 0, "subscribers_count": 5 } diff --git a/2024/CVE-2024-21111.json b/2024/CVE-2024-21111.json index ba6704e3b7..e5ae6c2e39 100644 --- a/2024/CVE-2024-21111.json +++ b/2024/CVE-2024-21111.json @@ -13,20 +13,20 @@ "description": "Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability", "fork": false, "created_at": "2024-04-22T07:05:04Z", - "updated_at": "2024-04-23T00:19:14Z", + "updated_at": "2024-04-23T06:21:32Z", "pushed_at": "2024-04-22T10:08:45Z", - "stargazers_count": 44, - "watchers_count": 44, + "stargazers_count": 69, + "watchers_count": 69, "has_discussions": false, - "forks_count": 8, + "forks_count": 12, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 8, - "watchers": 44, + "forks": 12, + "watchers": 69, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-21338.json b/2024/CVE-2024-21338.json index bad79cf3e7..5a4bd22dc7 100644 --- a/2024/CVE-2024-21338.json +++ b/2024/CVE-2024-21338.json @@ -13,10 +13,10 @@ "description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.", "fork": false, "created_at": "2024-04-13T05:53:02Z", - "updated_at": "2024-04-23T00:34:31Z", + "updated_at": "2024-04-23T06:18:53Z", "pushed_at": "2024-04-16T21:00:14Z", - "stargazers_count": 195, - "watchers_count": 195, + "stargazers_count": 196, + "watchers_count": 196, "has_discussions": false, "forks_count": 44, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 44, - "watchers": 195, + "watchers": 196, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-21626.json b/2024/CVE-2024-21626.json index 519257405c..3b0367e736 100644 --- a/2024/CVE-2024-21626.json +++ b/2024/CVE-2024-21626.json @@ -147,7 +147,7 @@ "forks": 0, "watchers": 4, "score": 0, - "subscribers_count": 1 + "subscribers_count": 2 }, { "id": 751817784, diff --git a/2024/CVE-2024-24576.json b/2024/CVE-2024-24576.json index bdcfa771f3..7cbbb714b4 100644 --- a/2024/CVE-2024-24576.json +++ b/2024/CVE-2024-24576.json @@ -27,7 +27,7 @@ "forks": 9, "watchers": 46, "score": 0, - "subscribers_count": 1 + "subscribers_count": 2 }, { "id": 784676322, diff --git a/2024/CVE-2024-27199.json b/2024/CVE-2024-27199.json index 42f7865dbd..1bf786ac42 100644 --- a/2024/CVE-2024-27199.json +++ b/2024/CVE-2024-27199.json @@ -37,6 +37,6 @@ "forks": 0, "watchers": 2, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-29296.json b/2024/CVE-2024-29296.json index d4ef4758a6..2dfcf0cc40 100644 --- a/2024/CVE-2024-29296.json +++ b/2024/CVE-2024-29296.json @@ -13,10 +13,10 @@ "description": "CVE-2024-29296 - User enumeration on Portainer CE - 2.19.4", "fork": false, "created_at": "2024-04-09T20:36:03Z", - "updated_at": "2024-04-10T19:24:51Z", + "updated_at": "2024-04-23T06:27:23Z", "pushed_at": "2024-04-11T13:53:50Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-31497.json b/2024/CVE-2024-31497.json index 92ca1111b9..436466ad59 100644 --- a/2024/CVE-2024-31497.json +++ b/2024/CVE-2024-31497.json @@ -27,7 +27,7 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 1 + "subscribers_count": 2 }, { "id": 787871319, @@ -87,6 +87,6 @@ "forks": 0, "watchers": 3, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-32399.json b/2024/CVE-2024-32399.json index 18f1bbdf16..f309c7cf46 100644 --- a/2024/CVE-2024-32399.json +++ b/2024/CVE-2024-32399.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-3273.json b/2024/CVE-2024-3273.json index 21ab2e146f..4ddc772362 100644 --- a/2024/CVE-2024-3273.json +++ b/2024/CVE-2024-3273.json @@ -194,5 +194,35 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 790582261, + "name": "CVE-2024-3273-", + "full_name": "mrrobot0o\/CVE-2024-3273-", + "owner": { + "login": "mrrobot0o", + "id": 88867340, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88867340?v=4", + "html_url": "https:\/\/github.com\/mrrobot0o" + }, + "html_url": "https:\/\/github.com\/mrrobot0o\/CVE-2024-3273-", + "description": null, + "fork": false, + "created_at": "2024-04-23T06:31:19Z", + "updated_at": "2024-04-23T06:31:22Z", + "pushed_at": "2024-04-23T06:31:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-3400.json b/2024/CVE-2024-3400.json index 89c39f80f1..ea468ded07 100644 --- a/2024/CVE-2024-3400.json +++ b/2024/CVE-2024-3400.json @@ -73,10 +73,10 @@ "description": "CVE-2024-3400", "fork": false, "created_at": "2024-04-13T14:00:31Z", - "updated_at": "2024-04-20T13:36:57Z", + "updated_at": "2024-04-23T04:23:40Z", "pushed_at": "2024-04-18T07:11:17Z", - "stargazers_count": 35, - "watchers_count": 35, + "stargazers_count": 37, + "watchers_count": 37, "has_discussions": false, "forks_count": 18, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 18, - "watchers": 35, + "watchers": 37, "score": 0, "subscribers_count": 2 }, @@ -283,19 +283,19 @@ "description": "CVE-2024-3400 Palo Alto OS Command Injection", "fork": false, "created_at": "2024-04-16T14:18:08Z", - "updated_at": "2024-04-22T21:37:50Z", + "updated_at": "2024-04-23T02:25:25Z", "pushed_at": "2024-04-16T22:35:43Z", - "stargazers_count": 110, - "watchers_count": 110, + "stargazers_count": 112, + "watchers_count": 112, "has_discussions": false, - "forks_count": 18, + "forks_count": 19, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 18, - "watchers": 110, + "forks": 19, + "watchers": 112, "score": 0, "subscribers_count": 1 }, @@ -313,10 +313,10 @@ "description": "CVE-2024-3400-RCE", "fork": false, "created_at": "2024-04-16T16:18:56Z", - "updated_at": "2024-04-22T20:43:30Z", + "updated_at": "2024-04-23T04:37:55Z", "pushed_at": "2024-04-22T08:50:27Z", - "stargazers_count": 25, - "watchers_count": 25, + "stargazers_count": 29, + "watchers_count": 29, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -325,7 +325,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 25, + "watchers": 29, "score": 0, "subscribers_count": 3 }, @@ -403,19 +403,19 @@ "description": "CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect", "fork": false, "created_at": "2024-04-16T21:24:15Z", - "updated_at": "2024-04-22T14:37:12Z", + "updated_at": "2024-04-23T03:33:59Z", "pushed_at": "2024-04-17T11:03:32Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, - "watchers": 6, + "forks": 2, + "watchers": 7, "score": 0, "subscribers_count": 2 }, @@ -477,7 +477,7 @@ "forks": 0, "watchers": 1, "score": 0, - "subscribers_count": 1 + "subscribers_count": 2 }, { "id": 788013743, diff --git a/2024/CVE-2024-4040.json b/2024/CVE-2024-4040.json index 831ac8ab78..e407367b2b 100644 --- a/2024/CVE-2024-4040.json +++ b/2024/CVE-2024-4040.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/README.md b/README.md index 44dbf301e2..bc1a030dde 100644 --- a/README.md +++ b/README.md @@ -375,6 +375,7 @@ - [K3ysTr0K3R/CVE-2024-3273-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2024-3273-EXPLOIT) - [ThatNotEasy/CVE-2024-3273](https://github.com/ThatNotEasy/CVE-2024-3273) - [LeopoldSkell/CVE-2024-3273](https://github.com/LeopoldSkell/CVE-2024-3273) +- [mrrobot0o/CVE-2024-3273-](https://github.com/mrrobot0o/CVE-2024-3273-) ### CVE-2024-3400 (2024-04-12) @@ -1678,6 +1679,7 @@ - [puckiestyle/CVE-2023-0386](https://github.com/puckiestyle/CVE-2023-0386) - [letsr00t/CVE-2023-0386](https://github.com/letsr00t/CVE-2023-0386) - [churamanib/CVE-2023-0386](https://github.com/churamanib/CVE-2023-0386) +- [EstamelGG/CVE-2023-0386-libs](https://github.com/EstamelGG/CVE-2023-0386-libs) ### CVE-2023-0461 (2023-02-28) @@ -40962,6 +40964,7 @@ - [chleba124/vsftpd-exploit](https://github.com/chleba124/vsftpd-exploit) - [4m3rr0r/CVE-2011-2523-poc](https://github.com/4m3rr0r/CVE-2011-2523-poc) - [Shubham-2k1/Exploit-CVE-2011-2523](https://github.com/Shubham-2k1/Exploit-CVE-2011-2523) +- [Tenor-Z/SmileySploit](https://github.com/Tenor-Z/SmileySploit) ### CVE-2011-2894 (2011-10-04)