diff --git a/2017/CVE-2017-7269.json b/2017/CVE-2017-7269.json
index 89e6702787..cf74fe45ce 100644
--- a/2017/CVE-2017-7269.json
+++ b/2017/CVE-2017-7269.json
@@ -603,15 +603,15 @@
{
"id": 868559608,
"name": "CVE-2017-7269",
- "full_name": "geniuszlyy\/CVE-2017-7269",
+ "full_name": "geniuszly\/CVE-2017-7269",
"owner": {
- "login": "geniuszlyy",
+ "login": "geniuszly",
"id": 137893386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
- "html_url": "https:\/\/github.com\/geniuszlyy",
+ "html_url": "https:\/\/github.com\/geniuszly",
"user_view_type": "public"
},
- "html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2017-7269",
+ "html_url": "https:\/\/github.com\/geniuszly\/CVE-2017-7269",
"description": "is a PoC tool demonstrating an exploit for a known vulnerability in the WebDAV component of IIS6",
"fork": false,
"created_at": "2024-10-06T17:33:11Z",
diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json
index f288ad4c46..0117e34fa2 100644
--- a/2019/CVE-2019-17558.json
+++ b/2019/CVE-2019-17558.json
@@ -45,10 +45,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
- "updated_at": "2024-12-28T15:30:30Z",
+ "updated_at": "2024-12-31T06:31:41Z",
"pushed_at": "2021-04-04T09:13:57Z",
- "stargazers_count": 4148,
- "watchers_count": 4148,
+ "stargazers_count": 4149,
+ "watchers_count": 4149,
"has_discussions": false,
"forks_count": 1099,
"allow_forking": true,
@@ -77,7 +77,7 @@
],
"visibility": "public",
"forks": 1099,
- "watchers": 4148,
+ "watchers": 4149,
"score": 0,
"subscribers_count": 149
},
diff --git a/2019/CVE-2019-9193.json b/2019/CVE-2019-9193.json
index 1f59947c21..401605bb69 100644
--- a/2019/CVE-2019-9193.json
+++ b/2019/CVE-2019-9193.json
@@ -134,15 +134,15 @@
{
"id": 868553994,
"name": "CVE-2019-9193",
- "full_name": "geniuszlyy\/CVE-2019-9193",
+ "full_name": "geniuszly\/CVE-2019-9193",
"owner": {
- "login": "geniuszlyy",
+ "login": "geniuszly",
"id": 137893386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
- "html_url": "https:\/\/github.com\/geniuszlyy",
+ "html_url": "https:\/\/github.com\/geniuszly",
"user_view_type": "public"
},
- "html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2019-9193",
+ "html_url": "https:\/\/github.com\/geniuszly\/CVE-2019-9193",
"description": "is a PoC tool designed to exploit an authenticated Remote Code Execution (RCE) vulnerability in specific versions of PostgreSQL (9.3 - 11.7)",
"fork": false,
"created_at": "2024-10-06T17:16:44Z",
diff --git a/2020/CVE-2020-1066.json b/2020/CVE-2020-1066.json
index 49609e95fd..9ed27136b6 100644
--- a/2020/CVE-2020-1066.json
+++ b/2020/CVE-2020-1066.json
@@ -45,10 +45,10 @@
"description": null,
"fork": false,
"created_at": "2021-03-07T06:55:26Z",
- "updated_at": "2023-02-02T06:25:02Z",
+ "updated_at": "2024-12-31T08:57:35Z",
"pushed_at": "2021-03-07T07:09:16Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "stargazers_count": 1,
+ "watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 0,
+ "watchers": 1,
"score": 0,
"subscribers_count": 3
}
diff --git a/2020/CVE-2020-13935.json b/2020/CVE-2020-13935.json
index 8cf7322fc2..e53dd0451e 100644
--- a/2020/CVE-2020-13935.json
+++ b/2020/CVE-2020-13935.json
@@ -19,13 +19,13 @@
"stargazers_count": 165,
"watchers_count": 165,
"has_discussions": false,
- "forks_count": 38,
+ "forks_count": 39,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 38,
+ "forks": 39,
"watchers": 165,
"score": 0,
"subscribers_count": 3
diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json
index 551dd61cb8..ac36b12223 100644
--- a/2020/CVE-2020-14882.json
+++ b/2020/CVE-2020-14882.json
@@ -14,10 +14,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
- "updated_at": "2024-12-28T15:30:30Z",
+ "updated_at": "2024-12-31T06:31:41Z",
"pushed_at": "2021-04-04T09:13:57Z",
- "stargazers_count": 4148,
- "watchers_count": 4148,
+ "stargazers_count": 4149,
+ "watchers_count": 4149,
"has_discussions": false,
"forks_count": 1099,
"allow_forking": true,
@@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 1099,
- "watchers": 4148,
+ "watchers": 4149,
"score": 0,
"subscribers_count": 149
},
diff --git a/2020/CVE-2020-15916.json b/2020/CVE-2020-15916.json
index a5b28da0f8..54d56abeb2 100644
--- a/2020/CVE-2020-15916.json
+++ b/2020/CVE-2020-15916.json
@@ -2,15 +2,15 @@
{
"id": 872064512,
"name": "CVE-2020-15916",
- "full_name": "geniuszlyy\/CVE-2020-15916",
+ "full_name": "geniuszly\/CVE-2020-15916",
"owner": {
- "login": "geniuszlyy",
+ "login": "geniuszly",
"id": 137893386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
- "html_url": "https:\/\/github.com\/geniuszlyy",
+ "html_url": "https:\/\/github.com\/geniuszly",
"user_view_type": "public"
},
- "html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2020-15916",
+ "html_url": "https:\/\/github.com\/geniuszly\/CVE-2020-15916",
"description": "This project is a PoC for exploiting CVE-2020-15916, a vulnerability that allows unauthorized changes to the LAN configuration of a device",
"fork": false,
"created_at": "2024-10-13T17:30:19Z",
diff --git a/2020/CVE-2020-17136.json b/2020/CVE-2020-17136.json
index 63fbf0d195..0348270746 100644
--- a/2020/CVE-2020-17136.json
+++ b/2020/CVE-2020-17136.json
@@ -14,10 +14,10 @@
"description": "CVE-2020-17136 exploit",
"fork": false,
"created_at": "2021-03-18T11:16:36Z",
- "updated_at": "2024-07-18T13:43:22Z",
+ "updated_at": "2024-12-31T08:57:18Z",
"pushed_at": "2021-03-31T14:42:19Z",
- "stargazers_count": 2,
- "watchers_count": 2,
+ "stargazers_count": 3,
+ "watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 2,
+ "watchers": 3,
"score": 0,
"subscribers_count": 2
},
diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json
index a3ce662083..50cb545f44 100644
--- a/2021/CVE-2021-21972.json
+++ b/2021/CVE-2021-21972.json
@@ -848,10 +848,10 @@
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
- "updated_at": "2024-12-28T01:54:56Z",
+ "updated_at": "2024-12-31T07:49:37Z",
"pushed_at": "2024-04-25T06:09:38Z",
- "stargazers_count": 1359,
- "watchers_count": 1359,
+ "stargazers_count": 1360,
+ "watchers_count": 1360,
"has_discussions": false,
"forks_count": 167,
"allow_forking": true,
@@ -867,7 +867,7 @@
],
"visibility": "public",
"forks": 167,
- "watchers": 1359,
+ "watchers": 1360,
"score": 0,
"subscribers_count": 15
}
diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json
index 8abf70f0d7..e97fc68b86 100644
--- a/2021/CVE-2021-3129.json
+++ b/2021/CVE-2021-3129.json
@@ -359,10 +359,10 @@
"description": "Laravel RCE Exploit Script - CVE-2021-3129",
"fork": false,
"created_at": "2022-04-16T17:22:55Z",
- "updated_at": "2024-12-17T05:59:50Z",
+ "updated_at": "2024-12-31T06:24:18Z",
"pushed_at": "2024-09-22T13:10:27Z",
- "stargazers_count": 95,
- "watchers_count": 95,
+ "stargazers_count": 96,
+ "watchers_count": 96,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@@ -386,7 +386,7 @@
],
"visibility": "public",
"forks": 20,
- "watchers": 95,
+ "watchers": 96,
"score": 0,
"subscribers_count": 1
},
diff --git a/2021/CVE-2021-3560.json b/2021/CVE-2021-3560.json
index 207351bebe..237ca37e2f 100644
--- a/2021/CVE-2021-3560.json
+++ b/2021/CVE-2021-3560.json
@@ -395,10 +395,10 @@
"description": "CVE-2021-3560 analysis",
"fork": false,
"created_at": "2022-01-31T09:02:23Z",
- "updated_at": "2024-11-27T19:11:24Z",
+ "updated_at": "2024-12-31T09:32:51Z",
"pushed_at": "2022-05-23T02:23:38Z",
- "stargazers_count": 8,
- "watchers_count": 8,
+ "stargazers_count": 9,
+ "watchers_count": 9,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@@ -407,7 +407,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
- "watchers": 8,
+ "watchers": 9,
"score": 0,
"subscribers_count": 2
},
diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json
index a0a152bcea..99787e1068 100644
--- a/2021/CVE-2021-44228.json
+++ b/2021/CVE-2021-44228.json
@@ -107,10 +107,10 @@
"description": "Remote Code Injection In Log4j",
"fork": false,
"created_at": "2021-12-10T05:23:44Z",
- "updated_at": "2024-12-08T07:27:57Z",
+ "updated_at": "2024-12-31T10:04:30Z",
"pushed_at": "2022-01-18T12:01:52Z",
- "stargazers_count": 460,
- "watchers_count": 460,
+ "stargazers_count": 461,
+ "watchers_count": 461,
"has_discussions": false,
"forks_count": 122,
"allow_forking": true,
@@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 122,
- "watchers": 460,
+ "watchers": 461,
"score": 0,
"subscribers_count": 8
},
diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json
index 211469552d..4d003ac115 100644
--- a/2022/CVE-2022-22954.json
+++ b/2022/CVE-2022-22954.json
@@ -792,10 +792,10 @@
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
- "updated_at": "2024-12-28T01:54:56Z",
+ "updated_at": "2024-12-31T07:49:37Z",
"pushed_at": "2024-04-25T06:09:38Z",
- "stargazers_count": 1359,
- "watchers_count": 1359,
+ "stargazers_count": 1360,
+ "watchers_count": 1360,
"has_discussions": false,
"forks_count": 167,
"allow_forking": true,
@@ -811,7 +811,7 @@
],
"visibility": "public",
"forks": 167,
- "watchers": 1359,
+ "watchers": 1360,
"score": 0,
"subscribers_count": 15
}
diff --git a/2022/CVE-2022-2414.json b/2022/CVE-2022-2414.json
index 06f36c994a..d91c146310 100644
--- a/2022/CVE-2022-2414.json
+++ b/2022/CVE-2022-2414.json
@@ -95,15 +95,15 @@
{
"id": 869025784,
"name": "CVE-2022-2414",
- "full_name": "geniuszlyy\/CVE-2022-2414",
+ "full_name": "geniuszly\/CVE-2022-2414",
"owner": {
- "login": "geniuszlyy",
+ "login": "geniuszly",
"id": 137893386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
- "html_url": "https:\/\/github.com\/geniuszlyy",
+ "html_url": "https:\/\/github.com\/geniuszly",
"user_view_type": "public"
},
- "html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2022-2414",
+ "html_url": "https:\/\/github.com\/geniuszly\/CVE-2022-2414",
"description": "is a PoC script for demonstrating an XML External Entity (XXE) vulnerability exploitation",
"fork": false,
"created_at": "2024-10-07T15:36:39Z",
diff --git a/2022/CVE-2022-44149.json b/2022/CVE-2022-44149.json
index 5a61443604..1a829fe287 100644
--- a/2022/CVE-2022-44149.json
+++ b/2022/CVE-2022-44149.json
@@ -33,15 +33,15 @@
{
"id": 840469662,
"name": "CVE-2022-44149",
- "full_name": "geniuszlyy\/CVE-2022-44149",
+ "full_name": "geniuszly\/CVE-2022-44149",
"owner": {
- "login": "geniuszlyy",
+ "login": "geniuszly",
"id": 137893386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
- "html_url": "https:\/\/github.com\/geniuszlyy",
+ "html_url": "https:\/\/github.com\/geniuszly",
"user_view_type": "public"
},
- "html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2022-44149",
+ "html_url": "https:\/\/github.com\/geniuszly\/CVE-2022-44149",
"description": "it is script designed to interact with a router by sending a payload to its system tools. The script retrieves the router's configuration from environment variables to ensure security. It includes functions for generating an authorization header, sending a payload, and logging the process.",
"fork": false,
"created_at": "2024-08-09T19:27:22Z",
diff --git a/2022/CVE-2022-45701.json b/2022/CVE-2022-45701.json
index ea4fb329dd..b9a52129c8 100644
--- a/2022/CVE-2022-45701.json
+++ b/2022/CVE-2022-45701.json
@@ -33,15 +33,15 @@
{
"id": 840470520,
"name": "CVE-2022-45701",
- "full_name": "geniuszlyy\/CVE-2022-45701",
+ "full_name": "geniuszly\/CVE-2022-45701",
"owner": {
- "login": "geniuszlyy",
+ "login": "geniuszly",
"id": 137893386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
- "html_url": "https:\/\/github.com\/geniuszlyy",
+ "html_url": "https:\/\/github.com\/geniuszly",
"user_view_type": "public"
},
- "html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2022-45701",
+ "html_url": "https:\/\/github.com\/geniuszly\/CVE-2022-45701",
"description": "it is script designed to exploit certain vulnerabilities in routers by sending payloads through SNMP (Simple Network Management Protocol). The script automates the process of authorization, payload generation, and execution, allowing for remote command execution on the target device.",
"fork": false,
"created_at": "2024-08-09T19:30:20Z",
diff --git a/2022/CVE-2022-46080.json b/2022/CVE-2022-46080.json
index f8a1b7a107..86bcff226b 100644
--- a/2022/CVE-2022-46080.json
+++ b/2022/CVE-2022-46080.json
@@ -33,15 +33,15 @@
{
"id": 840471119,
"name": "CVE-2022-46080",
- "full_name": "geniuszlyy\/CVE-2022-46080",
+ "full_name": "geniuszly\/CVE-2022-46080",
"owner": {
- "login": "geniuszlyy",
+ "login": "geniuszly",
"id": 137893386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
- "html_url": "https:\/\/github.com\/geniuszlyy",
+ "html_url": "https:\/\/github.com\/geniuszly",
"user_view_type": "public"
},
- "html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2022-46080",
+ "html_url": "https:\/\/github.com\/geniuszly\/CVE-2022-46080",
"description": "it is script that enables Telnet on routers by sending a specially crafted request. The script allows users to specify the router's URL, Telnet port, and password. It validates the inputs and logs the process, providing feedback on whether the exploit was successful.",
"fork": false,
"created_at": "2024-08-09T19:32:32Z",
diff --git a/2022/CVE-2022-46689.json b/2022/CVE-2022-46689.json
index e67ea1c44e..001ef2147f 100644
--- a/2022/CVE-2022-46689.json
+++ b/2022/CVE-2022-46689.json
@@ -107,10 +107,10 @@
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
"fork": false,
"created_at": "2022-12-26T06:56:35Z",
- "updated_at": "2024-12-31T02:53:03Z",
+ "updated_at": "2024-12-31T11:17:24Z",
"pushed_at": "2023-08-02T09:35:14Z",
- "stargazers_count": 884,
- "watchers_count": 884,
+ "stargazers_count": 885,
+ "watchers_count": 885,
"has_discussions": false,
"forks_count": 72,
"allow_forking": true,
@@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 72,
- "watchers": 884,
+ "watchers": 885,
"score": 0,
"subscribers_count": 26
},
@@ -231,10 +231,10 @@
"description": "CVE-2022-46689",
"fork": false,
"created_at": "2023-01-05T21:50:25Z",
- "updated_at": "2024-12-06T00:25:02Z",
+ "updated_at": "2024-12-31T11:17:24Z",
"pushed_at": "2023-06-13T08:55:50Z",
- "stargazers_count": 145,
- "watchers_count": 145,
+ "stargazers_count": 146,
+ "watchers_count": 146,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@@ -245,7 +245,7 @@
],
"visibility": "public",
"forks": 7,
- "watchers": 145,
+ "watchers": 146,
"score": 0,
"subscribers_count": 12
},
diff --git a/2023/CVE-2023-20872.json b/2023/CVE-2023-20872.json
index 8e5e60e392..ae3a7a9ef9 100644
--- a/2023/CVE-2023-20872.json
+++ b/2023/CVE-2023-20872.json
@@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-07-18T11:45:30Z",
- "updated_at": "2024-12-30T08:58:33Z",
+ "updated_at": "2024-12-31T07:55:52Z",
"pushed_at": "2024-07-19T14:01:31Z",
- "stargazers_count": 18,
- "watchers_count": 18,
+ "stargazers_count": 19,
+ "watchers_count": 19,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 18,
+ "watchers": 19,
"score": 0,
"subscribers_count": 1
}
diff --git a/2023/CVE-2023-33243.json b/2023/CVE-2023-33243.json
index a469bc324a..4fd6a22cc3 100644
--- a/2023/CVE-2023-33243.json
+++ b/2023/CVE-2023-33243.json
@@ -19,13 +19,13 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
- "forks_count": 2,
+ "forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 2,
+ "forks": 3,
"watchers": 1,
"score": 0,
"subscribers_count": 2
diff --git a/2023/CVE-2023-38709.json b/2023/CVE-2023-38709.json
index 2a32e7472d..3104c1154d 100644
--- a/2023/CVE-2023-38709.json
+++ b/2023/CVE-2023-38709.json
@@ -14,10 +14,10 @@
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
"fork": false,
"created_at": "2024-10-05T20:32:45Z",
- "updated_at": "2024-12-31T05:58:53Z",
+ "updated_at": "2024-12-31T12:24:50Z",
"pushed_at": "2024-10-05T20:37:02Z",
- "stargazers_count": 54,
- "watchers_count": 54,
+ "stargazers_count": 58,
+ "watchers_count": 58,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@@ -37,7 +37,7 @@
],
"visibility": "public",
"forks": 8,
- "watchers": 54,
+ "watchers": 58,
"score": 0,
"subscribers_count": 1
}
diff --git a/2023/CVE-2023-40404.json b/2023/CVE-2023-40404.json
index 322ef30048..7927a6bf2c 100644
--- a/2023/CVE-2023-40404.json
+++ b/2023/CVE-2023-40404.json
@@ -2,15 +2,15 @@
{
"id": 865477756,
"name": "GenEtherExploit",
- "full_name": "geniuszlyy\/GenEtherExploit",
+ "full_name": "geniuszly\/GenEtherExploit",
"owner": {
- "login": "geniuszlyy",
+ "login": "geniuszly",
"id": 137893386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
- "html_url": "https:\/\/github.com\/geniuszlyy",
+ "html_url": "https:\/\/github.com\/geniuszly",
"user_view_type": "public"
},
- "html_url": "https:\/\/github.com\/geniuszlyy\/GenEtherExploit",
+ "html_url": "https:\/\/github.com\/geniuszly\/GenEtherExploit",
"description": "is a PoC exploit for the macOS vulnerability CVE-2023-40404. This PoC leverages IOKit APIs to interact with the IOUserEthernetResource network service, manipulating the system's network interfaces",
"fork": false,
"created_at": "2024-09-30T15:41:14Z",
diff --git a/2023/CVE-2023-41993.json b/2023/CVE-2023-41993.json
index a5e93caddc..0fe02f32a9 100644
--- a/2023/CVE-2023-41993.json
+++ b/2023/CVE-2023-41993.json
@@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2023-10-15T12:14:18Z",
- "updated_at": "2024-12-21T00:56:57Z",
+ "updated_at": "2024-12-31T07:18:24Z",
"pushed_at": "2024-03-08T12:57:53Z",
- "stargazers_count": 196,
- "watchers_count": 196,
+ "stargazers_count": 197,
+ "watchers_count": 197,
"has_discussions": false,
"forks_count": 34,
"allow_forking": true,
@@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 34,
- "watchers": 196,
+ "watchers": 197,
"score": 0,
"subscribers_count": 10
},
diff --git a/2023/CVE-2023-42442.json b/2023/CVE-2023-42442.json
index 09712aa7f6..ea831679c3 100644
--- a/2023/CVE-2023-42442.json
+++ b/2023/CVE-2023-42442.json
@@ -45,10 +45,10 @@
"description": "JumpServer 堡垒机未授权综合漏洞利用, Exploit for CVE-2023-42442 \/ CVE-2023-42820 \/ RCE 2021",
"fork": false,
"created_at": "2023-10-14T09:35:07Z",
- "updated_at": "2024-12-09T07:21:54Z",
+ "updated_at": "2024-12-31T11:10:26Z",
"pushed_at": "2024-05-16T07:42:00Z",
- "stargazers_count": 223,
- "watchers_count": 223,
+ "stargazers_count": 224,
+ "watchers_count": 224,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@@ -61,7 +61,7 @@
],
"visibility": "public",
"forks": 23,
- "watchers": 223,
+ "watchers": 224,
"score": 0,
"subscribers_count": 3
},
diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json
index 8d9d0741d6..0f28cd0c10 100644
--- a/2023/CVE-2023-45866.json
+++ b/2023/CVE-2023-45866.json
@@ -14,7 +14,7 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
- "updated_at": "2024-12-28T12:43:30Z",
+ "updated_at": "2024-12-31T08:20:51Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1313,
"watchers_count": 1313,
diff --git a/2023/CVE-2023-46604.json b/2023/CVE-2023-46604.json
index 442e508838..e231536ee5 100644
--- a/2023/CVE-2023-46604.json
+++ b/2023/CVE-2023-46604.json
@@ -45,10 +45,10 @@
"description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具",
"fork": false,
"created_at": "2023-10-27T05:57:21Z",
- "updated_at": "2024-12-28T10:59:12Z",
+ "updated_at": "2024-12-31T06:57:19Z",
"pushed_at": "2024-01-29T02:28:11Z",
- "stargazers_count": 235,
- "watchers_count": 235,
+ "stargazers_count": 236,
+ "watchers_count": 236,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
- "watchers": 235,
+ "watchers": 236,
"score": 0,
"subscribers_count": 4
},
diff --git a/2024/CVE-2024-0582.json b/2024/CVE-2024-0582.json
index eff7dd249f..167b7e39cb 100644
--- a/2024/CVE-2024-0582.json
+++ b/2024/CVE-2024-0582.json
@@ -95,15 +95,15 @@
{
"id": 866966019,
"name": "CVE-2024-0582",
- "full_name": "geniuszlyy\/CVE-2024-0582",
+ "full_name": "geniuszly\/CVE-2024-0582",
"owner": {
- "login": "geniuszlyy",
+ "login": "geniuszly",
"id": 137893386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
- "html_url": "https:\/\/github.com\/geniuszlyy",
+ "html_url": "https:\/\/github.com\/geniuszly",
"user_view_type": "public"
},
- "html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2024-0582",
+ "html_url": "https:\/\/github.com\/geniuszly\/CVE-2024-0582",
"description": "is a PoC exploit targeting a specific vulnerability in the Linux kernel (CVE-2024-0582)",
"fork": false,
"created_at": "2024-10-03T07:56:36Z",
diff --git a/2024/CVE-2024-10508.json b/2024/CVE-2024-10508.json
index 6d0d673ed9..da79c8bab5 100644
--- a/2024/CVE-2024-10508.json
+++ b/2024/CVE-2024-10508.json
@@ -19,13 +19,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
+ "forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
diff --git a/2024/CVE-2024-12025.json b/2024/CVE-2024-12025.json
index 3e3c5b9da8..5aa7dbf234 100644
--- a/2024/CVE-2024-12025.json
+++ b/2024/CVE-2024-12025.json
@@ -14,10 +14,10 @@
"description": "Collapsing Categories <= 3.0.8 - Unauthenticated SQL Injection",
"fork": false,
"created_at": "2024-12-19T14:15:29Z",
- "updated_at": "2024-12-19T15:53:19Z",
+ "updated_at": "2024-12-31T06:46:57Z",
"pushed_at": "2024-12-19T14:16:35Z",
- "stargazers_count": 1,
- "watchers_count": 1,
+ "stargazers_count": 2,
+ "watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 1,
+ "watchers": 2,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-21182.json b/2024/CVE-2024-21182.json
index 22cff78e13..f28945936d 100644
--- a/2024/CVE-2024-21182.json
+++ b/2024/CVE-2024-21182.json
@@ -14,19 +14,19 @@
"description": "PoC for CVE-2024-21182",
"fork": false,
"created_at": "2024-12-29T15:48:03Z",
- "updated_at": "2024-12-31T05:15:18Z",
+ "updated_at": "2024-12-31T08:58:18Z",
"pushed_at": "2024-12-29T15:56:14Z",
- "stargazers_count": 23,
- "watchers_count": 23,
+ "stargazers_count": 24,
+ "watchers_count": 24,
"has_discussions": false,
- "forks_count": 4,
+ "forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 4,
- "watchers": 23,
+ "forks": 5,
+ "watchers": 24,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-22274.json b/2024/CVE-2024-22274.json
index d3624126b1..67d3d9bf9b 100644
--- a/2024/CVE-2024-22274.json
+++ b/2024/CVE-2024-22274.json
@@ -83,10 +83,10 @@
"description": "PoC - Authenticated Remote Code Execution in VMware vCenter Server (Exploit)",
"fork": false,
"created_at": "2024-07-15T07:26:59Z",
- "updated_at": "2024-12-27T08:50:30Z",
+ "updated_at": "2024-12-31T07:44:51Z",
"pushed_at": "2024-07-16T23:22:14Z",
- "stargazers_count": 39,
- "watchers_count": 39,
+ "stargazers_count": 40,
+ "watchers_count": 40,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@@ -106,7 +106,7 @@
],
"visibility": "public",
"forks": 7,
- "watchers": 39,
+ "watchers": 40,
"score": 0,
"subscribers_count": 2
},
diff --git a/2024/CVE-2024-23334.json b/2024/CVE-2024-23334.json
index f8fd8c9f07..a9c784ddfc 100644
--- a/2024/CVE-2024-23334.json
+++ b/2024/CVE-2024-23334.json
@@ -76,10 +76,10 @@
"description": "A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1",
"fork": false,
"created_at": "2024-03-18T20:39:27Z",
- "updated_at": "2024-12-30T04:28:59Z",
+ "updated_at": "2024-12-31T08:05:58Z",
"pushed_at": "2024-03-19T06:37:30Z",
- "stargazers_count": 16,
- "watchers_count": 16,
+ "stargazers_count": 17,
+ "watchers_count": 17,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 16,
+ "watchers": 17,
"score": 0,
"subscribers_count": 1
},
diff --git a/2024/CVE-2024-24919.json b/2024/CVE-2024-24919.json
index 7027509207..943d173d33 100644
--- a/2024/CVE-2024-24919.json
+++ b/2024/CVE-2024-24919.json
@@ -1630,15 +1630,15 @@
{
"id": 864811586,
"name": "CVE-2024-24919",
- "full_name": "geniuszlyy\/CVE-2024-24919",
+ "full_name": "geniuszly\/CVE-2024-24919",
"owner": {
- "login": "geniuszlyy",
+ "login": "geniuszly",
"id": 137893386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
- "html_url": "https:\/\/github.com\/geniuszlyy",
+ "html_url": "https:\/\/github.com\/geniuszly",
"user_view_type": "public"
},
- "html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2024-24919",
+ "html_url": "https:\/\/github.com\/geniuszly\/CVE-2024-24919",
"description": "PoC script for CVE-2024-24919 vulnerability. It scans a list of target URLs to identify security issues by sending HTTP POST requests and analyzing server responses",
"fork": false,
"created_at": "2024-09-29T08:20:56Z",
diff --git a/2024/CVE-2024-27198.json b/2024/CVE-2024-27198.json
index 6c0abb94ad..8b3955dec0 100644
--- a/2024/CVE-2024-27198.json
+++ b/2024/CVE-2024-27198.json
@@ -380,15 +380,15 @@
{
"id": 870123268,
"name": "CVE-2024-27198",
- "full_name": "geniuszlyy\/CVE-2024-27198",
+ "full_name": "geniuszly\/CVE-2024-27198",
"owner": {
- "login": "geniuszlyy",
+ "login": "geniuszly",
"id": 137893386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
- "html_url": "https:\/\/github.com\/geniuszlyy",
+ "html_url": "https:\/\/github.com\/geniuszly",
"user_view_type": "public"
},
- "html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2024-27198",
+ "html_url": "https:\/\/github.com\/geniuszly\/CVE-2024-27198",
"description": "is a PoC tool that targets a vulnerability in the TeamCity server (CVE-2024-27198)",
"fork": false,
"created_at": "2024-10-09T13:36:56Z",
diff --git a/2024/CVE-2024-28116.json b/2024/CVE-2024-28116.json
index bbc1e4f8a4..70e2e0b2a3 100644
--- a/2024/CVE-2024-28116.json
+++ b/2024/CVE-2024-28116.json
@@ -74,15 +74,15 @@
{
"id": 868072354,
"name": "GenGravSSTIExploit",
- "full_name": "geniuszlyy\/GenGravSSTIExploit",
+ "full_name": "geniuszly\/GenGravSSTIExploit",
"owner": {
- "login": "geniuszlyy",
+ "login": "geniuszly",
"id": 137893386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
- "html_url": "https:\/\/github.com\/geniuszlyy",
+ "html_url": "https:\/\/github.com\/geniuszly",
"user_view_type": "public"
},
- "html_url": "https:\/\/github.com\/geniuszlyy\/GenGravSSTIExploit",
+ "html_url": "https:\/\/github.com\/geniuszly\/GenGravSSTIExploit",
"description": "is a PoC Python script that exploits an authenticated Server-Side Template Injection (SSTI) vulnerability in Grav CMS versions <= 1.7.44 (CVE-2024-28116)",
"fork": false,
"created_at": "2024-10-05T12:05:06Z",
diff --git a/2024/CVE-2024-2961.json b/2024/CVE-2024-2961.json
index ade33be963..851b3e7e19 100644
--- a/2024/CVE-2024-2961.json
+++ b/2024/CVE-2024-2961.json
@@ -76,10 +76,10 @@
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
"fork": false,
"created_at": "2024-05-27T08:30:06Z",
- "updated_at": "2024-12-30T11:26:49Z",
+ "updated_at": "2024-12-31T12:11:37Z",
"pushed_at": "2024-09-30T08:45:56Z",
- "stargazers_count": 427,
- "watchers_count": 427,
+ "stargazers_count": 426,
+ "watchers_count": 426,
"has_discussions": false,
"forks_count": 53,
"allow_forking": true,
@@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 53,
- "watchers": 427,
+ "watchers": 426,
"score": 0,
"subscribers_count": 8
},
diff --git a/2024/CVE-2024-36401.json b/2024/CVE-2024-36401.json
index b9c149e715..2dbb1d2e37 100644
--- a/2024/CVE-2024-36401.json
+++ b/2024/CVE-2024-36401.json
@@ -362,10 +362,10 @@
"description": "geoserver图形化漏洞利用工具",
"fork": false,
"created_at": "2024-10-05T10:08:55Z",
- "updated_at": "2024-12-26T04:19:46Z",
+ "updated_at": "2024-12-31T08:29:17Z",
"pushed_at": "2024-10-08T03:16:26Z",
- "stargazers_count": 27,
- "watchers_count": 27,
+ "stargazers_count": 28,
+ "watchers_count": 28,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -374,7 +374,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 27,
+ "watchers": 28,
"score": 0,
"subscribers_count": 1
},
diff --git a/2024/CVE-2024-38472.json b/2024/CVE-2024-38472.json
index 1a91a66423..0bf19da005 100644
--- a/2024/CVE-2024-38472.json
+++ b/2024/CVE-2024-38472.json
@@ -45,10 +45,10 @@
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
"fork": false,
"created_at": "2024-10-05T20:32:45Z",
- "updated_at": "2024-12-31T05:58:53Z",
+ "updated_at": "2024-12-31T12:24:50Z",
"pushed_at": "2024-10-05T20:37:02Z",
- "stargazers_count": 54,
- "watchers_count": 54,
+ "stargazers_count": 58,
+ "watchers_count": 58,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@@ -68,7 +68,7 @@
],
"visibility": "public",
"forks": 8,
- "watchers": 54,
+ "watchers": 58,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-4040.json b/2024/CVE-2024-4040.json
index 93e50cba06..224bc45159 100644
--- a/2024/CVE-2024-4040.json
+++ b/2024/CVE-2024-4040.json
@@ -455,15 +455,15 @@
{
"id": 865497094,
"name": "GenCrushSSTIExploit",
- "full_name": "geniuszlyy\/GenCrushSSTIExploit",
+ "full_name": "geniuszly\/GenCrushSSTIExploit",
"owner": {
- "login": "geniuszlyy",
+ "login": "geniuszly",
"id": 137893386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
- "html_url": "https:\/\/github.com\/geniuszlyy",
+ "html_url": "https:\/\/github.com\/geniuszly",
"user_view_type": "public"
},
- "html_url": "https:\/\/github.com\/geniuszlyy\/GenCrushSSTIExploit",
+ "html_url": "https:\/\/github.com\/geniuszly\/GenCrushSSTIExploit",
"description": "is a PoC for CVE-2024-4040 tool for exploiting the SSTI vulnerability in CrushFTP",
"fork": false,
"created_at": "2024-09-30T16:18:07Z",
diff --git a/2024/CVE-2024-42845.json b/2024/CVE-2024-42845.json
index 358d5e5bf9..9fa4ef98f3 100644
--- a/2024/CVE-2024-42845.json
+++ b/2024/CVE-2024-42845.json
@@ -14,7 +14,7 @@
"description": "InVesalius discovered CVE. CVE-2024-42845, CVE-2024-44825",
"fork": false,
"created_at": "2024-08-23T13:43:27Z",
- "updated_at": "2024-12-30T23:20:09Z",
+ "updated_at": "2024-12-31T10:26:10Z",
"pushed_at": "2024-12-20T09:48:52Z",
"stargazers_count": 2,
"watchers_count": 2,
diff --git a/2024/CVE-2024-43425.json b/2024/CVE-2024-43425.json
index 3d36da9b77..a95ed49f37 100644
--- a/2024/CVE-2024-43425.json
+++ b/2024/CVE-2024-43425.json
@@ -19,13 +19,13 @@
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
- "forks_count": 5,
+ "forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 5,
+ "forks": 6,
"watchers": 17,
"score": 0,
"subscribers_count": 0
diff --git a/2024/CVE-2024-44000.json b/2024/CVE-2024-44000.json
index d14962f100..05bb7c536e 100644
--- a/2024/CVE-2024-44000.json
+++ b/2024/CVE-2024-44000.json
@@ -95,15 +95,15 @@
{
"id": 870756822,
"name": "CVE-2024-44000",
- "full_name": "geniuszlyy\/CVE-2024-44000",
+ "full_name": "geniuszly\/CVE-2024-44000",
"owner": {
- "login": "geniuszlyy",
+ "login": "geniuszly",
"id": 137893386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
- "html_url": "https:\/\/github.com\/geniuszlyy",
+ "html_url": "https:\/\/github.com\/geniuszly",
"user_view_type": "public"
},
- "html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2024-44000",
+ "html_url": "https:\/\/github.com\/geniuszly\/CVE-2024-44000",
"description": "is a PoC tool designed to exploit insecurely exposed debug logs from WordPress sites and extract session cookies",
"fork": false,
"created_at": "2024-10-10T15:58:10Z",
diff --git a/2024/CVE-2024-46542.json b/2024/CVE-2024-46542.json
new file mode 100644
index 0000000000..354c8f623e
--- /dev/null
+++ b/2024/CVE-2024-46542.json
@@ -0,0 +1,33 @@
+[
+ {
+ "id": 910002853,
+ "name": "CVE-2024-46542",
+ "full_name": "MarioTesoro\/CVE-2024-46542",
+ "owner": {
+ "login": "MarioTesoro",
+ "id": 62204045,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62204045?v=4",
+ "html_url": "https:\/\/github.com\/MarioTesoro",
+ "user_view_type": "public"
+ },
+ "html_url": "https:\/\/github.com\/MarioTesoro\/CVE-2024-46542",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-12-30T08:58:05Z",
+ "updated_at": "2024-12-31T12:17:30Z",
+ "pushed_at": "2024-12-31T12:17:07Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-50379.json b/2024/CVE-2024-50379.json
index 464afe0104..27c80afc2f 100644
--- a/2024/CVE-2024-50379.json
+++ b/2024/CVE-2024-50379.json
@@ -169,10 +169,10 @@
"description": "RCE through a race condition in Apache Tomcat",
"fork": false,
"created_at": "2024-12-21T05:54:29Z",
- "updated_at": "2024-12-30T15:45:48Z",
+ "updated_at": "2024-12-31T10:33:55Z",
"pushed_at": "2024-12-21T08:56:44Z",
- "stargazers_count": 45,
- "watchers_count": 45,
+ "stargazers_count": 47,
+ "watchers_count": 47,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@@ -181,7 +181,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
- "watchers": 45,
+ "watchers": 47,
"score": 0,
"subscribers_count": 2
},
@@ -200,10 +200,10 @@
"description": "tomcat CVE-2024-50379\/CVE-2024-56337 条件竞争文件上传exp",
"fork": false,
"created_at": "2024-12-23T07:20:47Z",
- "updated_at": "2024-12-30T18:18:04Z",
+ "updated_at": "2024-12-31T10:14:53Z",
"pushed_at": "2024-12-23T07:30:27Z",
- "stargazers_count": 54,
- "watchers_count": 54,
+ "stargazers_count": 55,
+ "watchers_count": 55,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@@ -212,7 +212,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
- "watchers": 54,
+ "watchers": 55,
"score": 0,
"subscribers_count": 3
},
@@ -262,8 +262,8 @@
"description": "CVE-2024-50379-exp",
"fork": false,
"created_at": "2024-12-25T02:41:31Z",
- "updated_at": "2024-12-31T06:26:31Z",
- "pushed_at": "2024-12-31T06:26:28Z",
+ "updated_at": "2024-12-31T07:11:17Z",
+ "pushed_at": "2024-12-31T07:11:13Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
diff --git a/2024/CVE-2024-50623.json b/2024/CVE-2024-50623.json
index 39f4e3278a..bb3dc00e48 100644
--- a/2024/CVE-2024-50623.json
+++ b/2024/CVE-2024-50623.json
@@ -66,5 +66,36 @@
"watchers": 3,
"score": 0,
"subscribers_count": 2
+ },
+ {
+ "id": 910411215,
+ "name": "Cleo-CVE-2024-50623-PoC",
+ "full_name": "iSee857\/Cleo-CVE-2024-50623-PoC",
+ "owner": {
+ "login": "iSee857",
+ "id": 73977770,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73977770?v=4",
+ "html_url": "https:\/\/github.com\/iSee857",
+ "user_view_type": "public"
+ },
+ "html_url": "https:\/\/github.com\/iSee857\/Cleo-CVE-2024-50623-PoC",
+ "description": "Cleo 远程代码执行漏洞批量检测脚本(CVE-2024-50623)",
+ "fork": false,
+ "created_at": "2024-12-31T07:43:48Z",
+ "updated_at": "2024-12-31T07:46:53Z",
+ "pushed_at": "2024-12-31T07:46:50Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2024/CVE-2024-52475.json b/2024/CVE-2024-52475.json
index dd057dbbac..2b1f93bd29 100644
--- a/2024/CVE-2024-52475.json
+++ b/2024/CVE-2024-52475.json
@@ -19,13 +19,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
+ "forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
diff --git a/2024/CVE-2024-54152.json b/2024/CVE-2024-54152.json
index 12b313cb05..44112617a0 100644
--- a/2024/CVE-2024-54152.json
+++ b/2024/CVE-2024-54152.json
@@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-12-30T01:07:48Z",
- "updated_at": "2024-12-31T03:48:11Z",
+ "updated_at": "2024-12-31T10:15:57Z",
"pushed_at": "2024-12-30T01:08:00Z",
- "stargazers_count": 4,
- "watchers_count": 4,
+ "stargazers_count": 5,
+ "watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 4,
+ "watchers": 5,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-5522.json b/2024/CVE-2024-5522.json
index 021b43b3d2..e0a5d0cadb 100644
--- a/2024/CVE-2024-5522.json
+++ b/2024/CVE-2024-5522.json
@@ -64,15 +64,15 @@
{
"id": 866079798,
"name": "CVE-2024-5522",
- "full_name": "geniuszlyy\/CVE-2024-5522",
+ "full_name": "geniuszly\/CVE-2024-5522",
"owner": {
- "login": "geniuszlyy",
+ "login": "geniuszly",
"id": 137893386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
- "html_url": "https:\/\/github.com\/geniuszlyy",
+ "html_url": "https:\/\/github.com\/geniuszly",
"user_view_type": "public"
},
- "html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2024-5522",
+ "html_url": "https:\/\/github.com\/geniuszly\/CVE-2024-5522",
"description": "A PoC exploit scanner for CVE-2024-5522 vulnerability in WordPress websites",
"fork": false,
"created_at": "2024-10-01T16:02:12Z",
diff --git a/2024/CVE-2024-6387.json b/2024/CVE-2024-6387.json
index 0f9c85c791..fc16a4a443 100644
--- a/2024/CVE-2024-6387.json
+++ b/2024/CVE-2024-6387.json
@@ -45,10 +45,10 @@
"description": "32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo\/cve-2024-6387-poc",
"fork": false,
"created_at": "2024-07-01T12:16:21Z",
- "updated_at": "2024-12-26T06:26:46Z",
+ "updated_at": "2024-12-31T12:16:09Z",
"pushed_at": "2024-07-01T12:25:01Z",
- "stargazers_count": 380,
- "watchers_count": 380,
+ "stargazers_count": 379,
+ "watchers_count": 379,
"has_discussions": false,
"forks_count": 90,
"allow_forking": true,
@@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 90,
- "watchers": 380,
+ "watchers": 379,
"score": 0,
"subscribers_count": 8
},
@@ -2185,13 +2185,13 @@
"stargazers_count": 63,
"watchers_count": 63,
"has_discussions": false,
- "forks_count": 24,
+ "forks_count": 25,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 24,
+ "forks": 25,
"watchers": 63,
"score": 0,
"subscribers_count": 3
diff --git a/2024/CVE-2024-6592.json b/2024/CVE-2024-6592.json
index f1e064f682..155938fb8e 100644
--- a/2024/CVE-2024-6592.json
+++ b/2024/CVE-2024-6592.json
@@ -19,13 +19,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
- "forks_count": 1,
+ "forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 1,
+ "forks": 3,
"watchers": 2,
"score": 0,
"subscribers_count": 0
diff --git a/2024/CVE-2024-7029.json b/2024/CVE-2024-7029.json
index 69541f36f4..9937978cc7 100644
--- a/2024/CVE-2024-7029.json
+++ b/2024/CVE-2024-7029.json
@@ -73,15 +73,15 @@
{
"id": 869446465,
"name": "CVE-2024-7029",
- "full_name": "geniuszlyy\/CVE-2024-7029",
+ "full_name": "geniuszly\/CVE-2024-7029",
"owner": {
- "login": "geniuszlyy",
+ "login": "geniuszly",
"id": 137893386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
- "html_url": "https:\/\/github.com\/geniuszlyy",
+ "html_url": "https:\/\/github.com\/geniuszly",
"user_view_type": "public"
},
- "html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2024-7029",
+ "html_url": "https:\/\/github.com\/geniuszly\/CVE-2024-7029",
"description": " A PoC exploit for the CVE-2024-7029 vulnerability found in AvTech devices, allowing Remote Code Execution (RCE)",
"fork": false,
"created_at": "2024-10-08T10:04:08Z",
diff --git a/README.md b/README.md
index ce08b9bea8..24bfe567ef 100644
--- a/README.md
+++ b/README.md
@@ -190,7 +190,7 @@
- [ysanatomic/io_uring_LPE-CVE-2024-0582](https://github.com/ysanatomic/io_uring_LPE-CVE-2024-0582)
- [Forsaken0129/CVE-2024-0582](https://github.com/Forsaken0129/CVE-2024-0582)
- [0ptyx/cve-2024-0582](https://github.com/0ptyx/cve-2024-0582)
-- [geniuszlyy/CVE-2024-0582](https://github.com/geniuszlyy/CVE-2024-0582)
+- [geniuszly/CVE-2024-0582](https://github.com/geniuszly/CVE-2024-0582)
- [101010zyl/CVE-2024-0582](https://github.com/101010zyl/CVE-2024-0582)
### CVE-2024-0588 (2024-04-09)
@@ -880,7 +880,7 @@
- [olebris/CVE-2024-4040](https://github.com/olebris/CVE-2024-4040)
- [entroychang/CVE-2024-4040](https://github.com/entroychang/CVE-2024-4040)
- [safeer-accuknox/CrushFTP-cve-2024-4040-poc](https://github.com/safeer-accuknox/CrushFTP-cve-2024-4040-poc)
-- [geniuszlyy/GenCrushSSTIExploit](https://github.com/geniuszlyy/GenCrushSSTIExploit)
+- [geniuszly/GenCrushSSTIExploit](https://github.com/geniuszly/GenCrushSSTIExploit)
- [rahisec/CVE-2024-4040](https://github.com/rahisec/CVE-2024-4040)
### CVE-2024-4231 (2024-05-10)
@@ -1220,7 +1220,7 @@
- [truonghuuphuc/CVE-2024-5522-Poc](https://github.com/truonghuuphuc/CVE-2024-5522-Poc)
- [kryptonproject/CVE-2024-5522-PoC](https://github.com/kryptonproject/CVE-2024-5522-PoC)
-- [geniuszlyy/CVE-2024-5522](https://github.com/geniuszlyy/CVE-2024-5522)
+- [geniuszly/CVE-2024-5522](https://github.com/geniuszly/CVE-2024-5522)
### CVE-2024-5633 (2024-07-09)
@@ -1527,7 +1527,7 @@
- [bigherocenter/CVE-2024-7029-EXPLOIT](https://github.com/bigherocenter/CVE-2024-7029-EXPLOIT)
- [ebrasha/CVE-2024-7029](https://github.com/ebrasha/CVE-2024-7029)
-- [geniuszlyy/CVE-2024-7029](https://github.com/geniuszlyy/CVE-2024-7029)
+- [geniuszly/CVE-2024-7029](https://github.com/geniuszly/CVE-2024-7029)
### CVE-2024-7094 (2024-08-13)
@@ -2374,7 +2374,11 @@
- [samogod/CVE-2024-11728](https://github.com/samogod/CVE-2024-11728)
-### CVE-2024-11972
+### CVE-2024-11972 (2024-12-31)
+
+The Hunk Companion WordPress plugin before 1.9.0 does not correctly authorize some REST API endpoints, allowing unauthenticated requests to install and activate arbitrary Hunk Companion WordPress plugin before 1.9.0 from the WordPress.org repo, including vulnerable Hunk Companion WordPress plugin before 1.9.0 that have been closed.
+
+
- [JunTakemura/exploit-CVE-2024-11972](https://github.com/JunTakemura/exploit-CVE-2024-11972)
### CVE-2024-12025 (2024-12-18)
@@ -3630,7 +3634,7 @@
- [Jutrm/cve-2024-24919](https://github.com/Jutrm/cve-2024-24919)
- [LuisMateo1/Arbitrary-File-Read-CVE-2024-24919](https://github.com/LuisMateo1/Arbitrary-File-Read-CVE-2024-24919)
- [AhmedMansour93/Event-ID-263-Rule-Name-SOC287---Arbitrary-File-Read-on-Checkpoint-Security-Gateway-CVE-2024-24919-](https://github.com/AhmedMansour93/Event-ID-263-Rule-Name-SOC287---Arbitrary-File-Read-on-Checkpoint-Security-Gateway-CVE-2024-24919-)
-- [geniuszlyy/CVE-2024-24919](https://github.com/geniuszlyy/CVE-2024-24919)
+- [geniuszly/CVE-2024-24919](https://github.com/geniuszly/CVE-2024-24919)
- [skyrowalker/CVE-2024-24919](https://github.com/skyrowalker/CVE-2024-24919)
- [sar-3mar/CVE-2024-24919_POC](https://github.com/sar-3mar/CVE-2024-24919_POC)
- [NingXin2002/Check-Point_poc](https://github.com/NingXin2002/Check-Point_poc)
@@ -3995,7 +3999,7 @@
- [Stuub/RCity-CVE-2024-27198](https://github.com/Stuub/RCity-CVE-2024-27198)
- [HPT-Intern-Task-Submission/CVE-2024-27198](https://github.com/HPT-Intern-Task-Submission/CVE-2024-27198)
- [jrbH4CK/CVE-2024-27198](https://github.com/jrbH4CK/CVE-2024-27198)
-- [geniuszlyy/CVE-2024-27198](https://github.com/geniuszlyy/CVE-2024-27198)
+- [geniuszly/CVE-2024-27198](https://github.com/geniuszly/CVE-2024-27198)
- [Cythonic1/CVE-2024-27198_POC](https://github.com/Cythonic1/CVE-2024-27198_POC)
### CVE-2024-27292 (2024-02-29)
@@ -4222,7 +4226,7 @@
- [akabe1/Graver](https://github.com/akabe1/Graver)
- [gunzf0x/Grav-CMS-RCE-Authenticated](https://github.com/gunzf0x/Grav-CMS-RCE-Authenticated)
-- [geniuszlyy/GenGravSSTIExploit](https://github.com/geniuszlyy/GenGravSSTIExploit)
+- [geniuszly/GenGravSSTIExploit](https://github.com/geniuszly/GenGravSSTIExploit)
### CVE-2024-28247 (2024-03-27)
@@ -6510,7 +6514,7 @@
- [absholi7ly/CVE-2024-44000-LiteSpeed-Cache](https://github.com/absholi7ly/CVE-2024-44000-LiteSpeed-Cache)
- [gbrsh/CVE-2024-44000](https://github.com/gbrsh/CVE-2024-44000)
- [ifqygazhar/CVE-2024-44000-LiteSpeed-Cache](https://github.com/ifqygazhar/CVE-2024-44000-LiteSpeed-Cache)
-- [geniuszlyy/CVE-2024-44000](https://github.com/geniuszlyy/CVE-2024-44000)
+- [geniuszly/CVE-2024-44000](https://github.com/geniuszly/CVE-2024-44000)
### CVE-2024-44083 (2024-08-19)
@@ -6845,6 +6849,13 @@
- [EQSTLab/CVE-2024-46538](https://github.com/EQSTLab/CVE-2024-46538)
- [LauLeysen/CVE-2024-46538](https://github.com/LauLeysen/CVE-2024-46538)
+### CVE-2024-46542 (2024-12-30)
+
+Veritas / Arctera Data Insight before 7.1.1 allows Application Administrators to conduct SQL injection attacks.
+
+
+- [MarioTesoro/CVE-2024-46542](https://github.com/MarioTesoro/CVE-2024-46542)
+
### CVE-2024-46627 (2024-09-26)
Incorrect access control in BECN DATAGERRY v2.2 allows attackers to execute arbitrary commands via crafted web requests.
@@ -7315,6 +7326,7 @@
- [watchtowrlabs/CVE-2024-50623](https://github.com/watchtowrlabs/CVE-2024-50623)
- [verylazytech/CVE-2024-50623](https://github.com/verylazytech/CVE-2024-50623)
+- [iSee857/Cleo-CVE-2024-50623-PoC](https://github.com/iSee857/Cleo-CVE-2024-50623-PoC)
### CVE-2024-50657 (2024-11-22)
@@ -13811,7 +13823,7 @@
A use-after-free issue was addressed with improved memory management. This issue is fixed in macOS Sonoma 14.1. An app may be able to execute arbitrary code with kernel privileges.
-- [geniuszlyy/GenEtherExploit](https://github.com/geniuszlyy/GenEtherExploit)
+- [geniuszly/GenEtherExploit](https://github.com/geniuszly/GenEtherExploit)
### CVE-2023-40429 (2023-09-26)
@@ -16992,7 +17004,7 @@
- [superhac/CVE-2022-2414-POC](https://github.com/superhac/CVE-2022-2414-POC)
- [amitlttwo/CVE-2022-2414-Proof-Of-Concept](https://github.com/amitlttwo/CVE-2022-2414-Proof-Of-Concept)
- [satyasai1460/CVE-2022-2414](https://github.com/satyasai1460/CVE-2022-2414)
-- [geniuszlyy/CVE-2022-2414](https://github.com/geniuszlyy/CVE-2022-2414)
+- [geniuszly/CVE-2022-2414](https://github.com/geniuszly/CVE-2022-2414)
### CVE-2022-2466 (2022-08-31)
@@ -22322,7 +22334,7 @@
- [yerodin/CVE-2022-44149](https://github.com/yerodin/CVE-2022-44149)
-- [geniuszlyy/CVE-2022-44149](https://github.com/geniuszlyy/CVE-2022-44149)
+- [geniuszly/CVE-2022-44149](https://github.com/geniuszly/CVE-2022-44149)
### CVE-2022-44183 (2022-11-21)
@@ -22598,7 +22610,7 @@
- [yerodin/CVE-2022-45701](https://github.com/yerodin/CVE-2022-45701)
-- [geniuszlyy/CVE-2022-45701](https://github.com/geniuszlyy/CVE-2022-45701)
+- [geniuszly/CVE-2022-45701](https://github.com/geniuszly/CVE-2022-45701)
### CVE-2022-45728 (2023-01-12)
@@ -22658,7 +22670,7 @@
- [yerodin/CVE-2022-46080](https://github.com/yerodin/CVE-2022-46080)
-- [geniuszlyy/CVE-2022-46080](https://github.com/geniuszlyy/CVE-2022-46080)
+- [geniuszly/CVE-2022-46080](https://github.com/geniuszly/CVE-2022-46080)
### CVE-2022-46087 (2023-01-30)
@@ -33486,7 +33498,7 @@
goform/AdvSetLanip endpoint on Tenda AC15 AC1900 15.03.05.19 devices allows remote attackers to execute arbitrary system commands via shell metacharacters in the lanIp POST parameter.
-- [geniuszlyy/CVE-2020-15916](https://github.com/geniuszlyy/CVE-2020-15916)
+- [geniuszly/CVE-2020-15916](https://github.com/geniuszly/CVE-2020-15916)
### CVE-2020-15931 (2020-10-20)
@@ -36729,7 +36741,7 @@
- [b4keSn4ke/CVE-2019-9193](https://github.com/b4keSn4ke/CVE-2019-9193)
- [chromanite/CVE-2019-9193-PostgreSQL-9.3-11.7](https://github.com/chromanite/CVE-2019-9193-PostgreSQL-9.3-11.7)
- [paulotrindadec/CVE-2019-9193](https://github.com/paulotrindadec/CVE-2019-9193)
-- [geniuszlyy/CVE-2019-9193](https://github.com/geniuszlyy/CVE-2019-9193)
+- [geniuszly/CVE-2019-9193](https://github.com/geniuszly/CVE-2019-9193)
- [AxthonyV/CVE-2019-9193](https://github.com/AxthonyV/CVE-2019-9193)
- [A0be/CVE-2019-9193](https://github.com/A0be/CVE-2019-9193)
@@ -43527,7 +43539,7 @@
- [denchief1/CVE-2017-7269](https://github.com/denchief1/CVE-2017-7269)
- [Cappricio-Securities/CVE-2017-7269](https://github.com/Cappricio-Securities/CVE-2017-7269)
- [VanishedPeople/CVE-2017-7269](https://github.com/VanishedPeople/CVE-2017-7269)
-- [geniuszlyy/CVE-2017-7269](https://github.com/geniuszlyy/CVE-2017-7269)
+- [geniuszly/CVE-2017-7269](https://github.com/geniuszly/CVE-2017-7269)
- [AxthonyV/CVE-2017-7269](https://github.com/AxthonyV/CVE-2017-7269)
### CVE-2017-7308 (2017-03-29)