From 01d62561b2be4404407d46f125f61b5914a6222e Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Sun, 15 Oct 2023 03:28:13 +0900 Subject: [PATCH] Auto Update 2023/10/14 18:28:13 --- 2007/CVE-2007-2447.json | 90 ------------------- 2007/CVE-2007-3830.json | 32 ------- 2019/CVE-2019-0841.json | 8 +- 2019/CVE-2019-1040.json | 12 +-- 2019/CVE-2019-11043.json | 8 +- 2019/CVE-2019-15107.json | 30 ------- 2019/CVE-2019-17041.json | 32 ------- 2019/CVE-2019-5454.json | 32 ------- 2020/CVE-2020-1472.json | 8 +- 2021/CVE-2021-1675.json | 16 ++-- 2021/CVE-2021-3156.json | 8 +- 2021/CVE-2021-34527.json | 12 +-- 2021/CVE-2021-4034.json | 8 +- 2021/CVE-2021-44228.json | 8 +- 2022/CVE-2022-24086.json | 4 +- 2023/CVE-2023-0297.json | 4 +- 2023/CVE-2023-21768.json | 8 +- 2023/CVE-2023-22515.json | 16 ++-- 2023/CVE-2023-23397.json | 8 +- 2023/CVE-2023-27997.json | 12 +-- 2023/CVE-2023-35885.json | 8 +- 2023/CVE-2023-36723.json | 8 +- 2023/CVE-2023-36802.json | 12 +-- 2023/CVE-2023-3710.json | 30 +++++++ 2023/CVE-2023-38146.json | 15 +++- 2023/CVE-2023-38545.json | 8 +- 2023/CVE-2023-38646.json | 30 +++++++ 2023/CVE-2023-38831.json | 8 +- 2023/CVE-2023-42442.json | 14 +-- 2023/CVE-2023-42820.json | 8 +- 2023/CVE-2023-44487.json | 30 +++---- .../CVE-2023-45471.json | 24 ++--- README.md | 37 ++------ 33 files changed, 207 insertions(+), 381 deletions(-) delete mode 100644 2007/CVE-2007-3830.json delete mode 100644 2019/CVE-2019-17041.json delete mode 100644 2019/CVE-2019-5454.json rename 2019/CVE-2019-14450.json => 2023/CVE-2023-45471.json (50%) diff --git a/2007/CVE-2007-2447.json b/2007/CVE-2007-2447.json index 77a29503f2..bc65f4d2de 100644 --- a/2007/CVE-2007-2447.json +++ b/2007/CVE-2007-2447.json @@ -59,96 +59,6 @@ "score": 0, "subscribers_count": 0 }, - { - "id": 211957347, - "name": "smb_usermap", - "full_name": "b1fair\/smb_usermap", - "owner": { - "login": "b1fair", - "id": 43326124, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43326124?v=4", - "html_url": "https:\/\/github.com\/b1fair" - }, - "html_url": "https:\/\/github.com\/b1fair\/smb_usermap", - "description": "A simple exploit for CVE-2007-2447", - "fork": false, - "created_at": "2019-09-30T21:06:09Z", - "updated_at": "2019-10-01T18:44:18Z", - "pushed_at": "2019-10-01T18:44:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 235003634, - "name": "CVE-2007-2447", - "full_name": "JoseBarrios\/CVE-2007-2447", - "owner": { - "login": "JoseBarrios", - "id": 794342, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/794342?v=4", - "html_url": "https:\/\/github.com\/JoseBarrios" - }, - "html_url": "https:\/\/github.com\/JoseBarrios\/CVE-2007-2447", - "description": "Remote Command Injection Vulnerability (CVE-2007-2447), allows remote attackers to execute arbitrary commands by specifying a Samba username containing shell meta characters.", - "fork": false, - "created_at": "2020-01-20T02:30:35Z", - "updated_at": "2020-01-20T02:30:39Z", - "pushed_at": "2020-01-20T02:30:37Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 2 - }, - { - "id": 257885318, - "name": "CVE-2007-2447", - "full_name": "3x1t1um\/CVE-2007-2447", - "owner": { - "login": "3x1t1um", - "id": 54857145, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54857145?v=4", - "html_url": "https:\/\/github.com\/3x1t1um" - }, - "html_url": "https:\/\/github.com\/3x1t1um\/CVE-2007-2447", - "description": null, - "fork": false, - "created_at": "2020-04-22T11:47:16Z", - "updated_at": "2020-08-04T14:13:55Z", - "pushed_at": "2020-08-04T14:13:53Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 2 - }, { "id": 319098047, "name": "exploit-CVE-2007-2447", diff --git a/2007/CVE-2007-3830.json b/2007/CVE-2007-3830.json deleted file mode 100644 index 763c0cbc1f..0000000000 --- a/2007/CVE-2007-3830.json +++ /dev/null @@ -1,32 +0,0 @@ -[ - { - "id": 127832352, - "name": "CVE-2007-3830", - "full_name": "alt3kx\/CVE-2007-3830", - "owner": { - "login": "alt3kx", - "id": 3140111, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", - "html_url": "https:\/\/github.com\/alt3kx" - }, - "html_url": "https:\/\/github.com\/alt3kx\/CVE-2007-3830", - "description": "IBM Proventia Sensor Appliance - Multiple Input Validation Vulnerabilities", - "fork": false, - "created_at": "2018-04-03T01:18:41Z", - "updated_at": "2018-05-11T01:21:29Z", - "pushed_at": "2018-05-11T01:21:27Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 3 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-0841.json b/2019/CVE-2019-0841.json index cbd7ca64dd..144072f2ec 100644 --- a/2019/CVE-2019-0841.json +++ b/2019/CVE-2019-0841.json @@ -73,10 +73,10 @@ "description": "A fully automatic CVE-2019-0841 bypass targeting all versions of Edge in Windows 10.", "fork": false, "created_at": "2019-06-11T20:05:26Z", - "updated_at": "2023-09-28T11:02:51Z", + "updated_at": "2023-10-14T13:33:04Z", "pushed_at": "2019-06-11T20:49:42Z", - "stargazers_count": 60, - "watchers_count": 60, + "stargazers_count": 61, + "watchers_count": 61, "has_discussions": false, "forks_count": 32, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 32, - "watchers": 60, + "watchers": 61, "score": 0, "subscribers_count": 5 }, diff --git a/2019/CVE-2019-1040.json b/2019/CVE-2019-1040.json index 3cb437826e..c699ee488f 100644 --- a/2019/CVE-2019-1040.json +++ b/2019/CVE-2019-1040.json @@ -103,19 +103,19 @@ "description": null, "fork": false, "created_at": "2019-06-24T15:33:50Z", - "updated_at": "2023-09-28T11:03:23Z", + "updated_at": "2023-10-14T15:16:52Z", "pushed_at": "2020-11-09T07:33:12Z", - "stargazers_count": 276, - "watchers_count": 276, + "stargazers_count": 277, + "watchers_count": 277, "has_discussions": false, - "forks_count": 58, + "forks_count": 59, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 58, - "watchers": 276, + "forks": 59, + "watchers": 277, "score": 0, "subscribers_count": 9 }, diff --git a/2019/CVE-2019-11043.json b/2019/CVE-2019-11043.json index b148b1206a..1449604499 100644 --- a/2019/CVE-2019-11043.json +++ b/2019/CVE-2019-11043.json @@ -13,10 +13,10 @@ "description": "Exploit for CVE-2019-11043", "fork": false, "created_at": "2019-09-23T21:37:27Z", - "updated_at": "2023-10-09T23:27:52Z", + "updated_at": "2023-10-14T15:12:55Z", "pushed_at": "2019-11-12T18:53:14Z", - "stargazers_count": 1767, - "watchers_count": 1767, + "stargazers_count": 1768, + "watchers_count": 1768, "has_discussions": false, "forks_count": 260, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 260, - "watchers": 1767, + "watchers": 1768, "score": 0, "subscribers_count": 38 }, diff --git a/2019/CVE-2019-15107.json b/2019/CVE-2019-15107.json index 7eb421496e..1ceef79318 100644 --- a/2019/CVE-2019-15107.json +++ b/2019/CVE-2019-15107.json @@ -429,36 +429,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 318241258, - "name": "CVE-2019-15107", - "full_name": "diegojuan\/CVE-2019-15107", - "owner": { - "login": "diegojuan", - "id": 4934646, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4934646?v=4", - "html_url": "https:\/\/github.com\/diegojuan" - }, - "html_url": "https:\/\/github.com\/diegojuan\/CVE-2019-15107", - "description": null, - "fork": false, - "created_at": "2020-12-03T15:43:39Z", - "updated_at": "2020-12-03T15:53:03Z", - "pushed_at": "2020-12-03T15:53:01Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 2 - }, { "id": 382448618, "name": "CVE-2019-15107", diff --git a/2019/CVE-2019-17041.json b/2019/CVE-2019-17041.json deleted file mode 100644 index f67c142b7e..0000000000 --- a/2019/CVE-2019-17041.json +++ /dev/null @@ -1,32 +0,0 @@ -[ - { - "id": 318732411, - "name": "CVE-2019-17041", - "full_name": "Resery\/CVE-2019-17041", - "owner": { - "login": "Resery", - "id": 50428593, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50428593?v=4", - "html_url": "https:\/\/github.com\/Resery" - }, - "html_url": "https:\/\/github.com\/Resery\/CVE-2019-17041", - "description": null, - "fork": false, - "created_at": "2020-12-05T07:49:11Z", - "updated_at": "2023-01-10T03:22:16Z", - "pushed_at": "2020-12-05T07:50:36Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 2 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-5454.json b/2019/CVE-2019-5454.json deleted file mode 100644 index bc35289212..0000000000 --- a/2019/CVE-2019-5454.json +++ /dev/null @@ -1,32 +0,0 @@ -[ - { - "id": 319352277, - "name": "nextcloud_android", - "full_name": "shanika04\/nextcloud_android", - "owner": { - "login": "shanika04", - "id": 73774345, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73774345?v=4", - "html_url": "https:\/\/github.com\/shanika04" - }, - "html_url": "https:\/\/github.com\/shanika04\/nextcloud_android", - "description": "SQLi CVE-2019-5454", - "fork": false, - "created_at": "2020-12-07T14:53:25Z", - "updated_at": "2020-12-07T15:01:34Z", - "pushed_at": "2020-12-07T15:01:28Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index b70278ce79..82541b73c7 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -1627,10 +1627,10 @@ "description": "Zero-day-scanning is a Domain Controller vulnerability scanner, that currently includes checks for Zero-day-scanning (CVE-2020-1472), MS-PAR\/MS-RPRN and SMBv2 Signing.", "fork": false, "created_at": "2022-03-03T01:55:28Z", - "updated_at": "2023-03-28T01:27:40Z", + "updated_at": "2023-10-14T12:41:31Z", "pushed_at": "2022-03-03T07:50:52Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -1639,7 +1639,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 1, "score": 0, "subscribers_count": 0 }, diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index b1427e7d7b..2d558fc366 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -43,19 +43,19 @@ "description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527", "fork": false, "created_at": "2021-06-29T17:24:14Z", - "updated_at": "2023-10-13T02:20:05Z", + "updated_at": "2023-10-14T13:53:02Z", "pushed_at": "2021-07-20T15:28:13Z", - "stargazers_count": 1740, - "watchers_count": 1740, + "stargazers_count": 1741, + "watchers_count": 1741, "has_discussions": false, - "forks_count": 587, + "forks_count": 588, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 587, - "watchers": 1740, + "forks": 588, + "watchers": 1741, "score": 0, "subscribers_count": 46 }, @@ -707,13 +707,13 @@ "stargazers_count": 20, "watchers_count": 20, "has_discussions": false, - "forks_count": 9, + "forks_count": 10, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 9, + "forks": 10, "watchers": 20, "score": 0, "subscribers_count": 2 diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index e98a8a10b9..128dcbad7f 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -1074,10 +1074,10 @@ "description": "Sudo Baron Samedit Exploit", "fork": false, "created_at": "2021-03-15T17:37:02Z", - "updated_at": "2023-10-10T21:08:37Z", + "updated_at": "2023-10-14T13:34:34Z", "pushed_at": "2022-01-13T05:48:01Z", - "stargazers_count": 665, - "watchers_count": 665, + "stargazers_count": 666, + "watchers_count": 666, "has_discussions": false, "forks_count": 167, "allow_forking": true, @@ -1086,7 +1086,7 @@ "topics": [], "visibility": "public", "forks": 167, - "watchers": 665, + "watchers": 666, "score": 0, "subscribers_count": 11 }, diff --git a/2021/CVE-2021-34527.json b/2021/CVE-2021-34527.json index 244a6352e4..974443b30e 100644 --- a/2021/CVE-2021-34527.json +++ b/2021/CVE-2021-34527.json @@ -236,19 +236,19 @@ "description": "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE", "fork": false, "created_at": "2021-07-05T20:13:49Z", - "updated_at": "2023-10-08T11:28:18Z", + "updated_at": "2023-10-14T13:45:49Z", "pushed_at": "2023-08-25T16:11:40Z", - "stargazers_count": 739, - "watchers_count": 739, + "stargazers_count": 740, + "watchers_count": 740, "has_discussions": false, - "forks_count": 118, + "forks_count": 119, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 118, - "watchers": 739, + "forks": 119, + "watchers": 740, "score": 0, "subscribers_count": 10 }, diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index f00bab4e93..1e2533beb1 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -13,10 +13,10 @@ "description": "Local Privilege Escalation in polkit's pkexec", "fork": false, "created_at": "2022-01-25T23:11:30Z", - "updated_at": "2023-09-28T11:35:22Z", + "updated_at": "2023-10-14T12:41:36Z", "pushed_at": "2022-01-26T01:01:15Z", - "stargazers_count": 75, - "watchers_count": 75, + "stargazers_count": 74, + "watchers_count": 74, "has_discussions": false, "forks_count": 36, "allow_forking": true, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 36, - "watchers": 75, + "watchers": 74, "score": 0, "subscribers_count": 2 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 09663fbd0a..9e9327890d 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -907,10 +907,10 @@ "description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ", "fork": false, "created_at": "2021-12-10T23:19:28Z", - "updated_at": "2023-10-12T08:01:45Z", + "updated_at": "2023-10-14T13:23:46Z", "pushed_at": "2023-02-08T23:41:04Z", - "stargazers_count": 1648, - "watchers_count": 1648, + "stargazers_count": 1649, + "watchers_count": 1649, "has_discussions": false, "forks_count": 485, "allow_forking": true, @@ -924,7 +924,7 @@ ], "visibility": "public", "forks": 485, - "watchers": 1648, + "watchers": 1649, "score": 0, "subscribers_count": 25 }, diff --git a/2022/CVE-2022-24086.json b/2022/CVE-2022-24086.json index fbbbc8e2dd..5da4acb81e 100644 --- a/2022/CVE-2022-24086.json +++ b/2022/CVE-2022-24086.json @@ -108,13 +108,13 @@ "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, - "forks_count": 2, + "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 2, + "forks": 3, "watchers": 6, "score": 0, "subscribers_count": 2 diff --git a/2023/CVE-2023-0297.json b/2023/CVE-2023-0297.json index cc7de91dba..31a734b58a 100644 --- a/2023/CVE-2023-0297.json +++ b/2023/CVE-2023-0297.json @@ -18,13 +18,13 @@ "stargazers_count": 25, "watchers_count": 25, "has_discussions": false, - "forks_count": 9, + "forks_count": 10, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 9, + "forks": 10, "watchers": 25, "score": 0, "subscribers_count": 1 diff --git a/2023/CVE-2023-21768.json b/2023/CVE-2023-21768.json index e288d9e93a..57d297b9b8 100644 --- a/2023/CVE-2023-21768.json +++ b/2023/CVE-2023-21768.json @@ -13,10 +13,10 @@ "description": "LPE exploit for CVE-2023-21768", "fork": false, "created_at": "2023-03-07T23:00:27Z", - "updated_at": "2023-10-12T09:50:45Z", + "updated_at": "2023-10-14T15:57:40Z", "pushed_at": "2023-07-10T16:35:49Z", - "stargazers_count": 451, - "watchers_count": 451, + "stargazers_count": 452, + "watchers_count": 452, "has_discussions": false, "forks_count": 162, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 162, - "watchers": 451, + "watchers": 452, "score": 0, "subscribers_count": 10 }, diff --git a/2023/CVE-2023-22515.json b/2023/CVE-2023-22515.json index eefdd4f5a6..f7d9a43d89 100644 --- a/2023/CVE-2023-22515.json +++ b/2023/CVE-2023-22515.json @@ -73,10 +73,10 @@ "description": "CVE-2023-22515: Confluence Broken Access Control Exploit", "fork": false, "created_at": "2023-10-10T21:40:09Z", - "updated_at": "2023-10-14T01:57:58Z", + "updated_at": "2023-10-14T16:19:50Z", "pushed_at": "2023-10-11T18:07:05Z", - "stargazers_count": 41, - "watchers_count": 41, + "stargazers_count": 44, + "watchers_count": 44, "has_discussions": false, "forks_count": 10, "allow_forking": true, @@ -94,7 +94,7 @@ ], "visibility": "public", "forks": 10, - "watchers": 41, + "watchers": 44, "score": 0, "subscribers_count": 1 }, @@ -112,10 +112,10 @@ "description": "Confluence未授权添加管理员用户(CVE-2023-22515)漏洞利用工具", "fork": false, "created_at": "2023-10-11T08:42:17Z", - "updated_at": "2023-10-14T11:20:11Z", + "updated_at": "2023-10-14T14:23:40Z", "pushed_at": "2023-10-12T02:21:47Z", - "stargazers_count": 50, - "watchers_count": 50, + "stargazers_count": 52, + "watchers_count": 52, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -124,7 +124,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 50, + "watchers": 52, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-23397.json b/2023/CVE-2023-23397.json index 99a42c21da..fcf8b6349f 100644 --- a/2023/CVE-2023-23397.json +++ b/2023/CVE-2023-23397.json @@ -173,10 +173,10 @@ "description": null, "fork": false, "created_at": "2023-03-16T19:43:39Z", - "updated_at": "2023-10-05T11:27:28Z", + "updated_at": "2023-10-14T16:35:24Z", "pushed_at": "2023-03-17T07:47:40Z", - "stargazers_count": 341, - "watchers_count": 341, + "stargazers_count": 342, + "watchers_count": 342, "has_discussions": false, "forks_count": 64, "allow_forking": true, @@ -185,7 +185,7 @@ "topics": [], "visibility": "public", "forks": 64, - "watchers": 341, + "watchers": 342, "score": 0, "subscribers_count": 5 }, diff --git a/2023/CVE-2023-27997.json b/2023/CVE-2023-27997.json index ccf9ce7928..ee7de6aee1 100644 --- a/2023/CVE-2023-27997.json +++ b/2023/CVE-2023-27997.json @@ -223,19 +223,19 @@ "description": "xortigate-cve-2023-27997", "fork": false, "created_at": "2023-10-12T16:12:41Z", - "updated_at": "2023-10-14T09:57:58Z", + "updated_at": "2023-10-14T16:23:07Z", "pushed_at": "2023-10-12T16:17:23Z", - "stargazers_count": 21, - "watchers_count": 21, + "stargazers_count": 22, + "watchers_count": 22, "has_discussions": false, - "forks_count": 3, + "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 3, - "watchers": 21, + "forks": 5, + "watchers": 22, "score": 0, "subscribers_count": 3 }, diff --git a/2023/CVE-2023-35885.json b/2023/CVE-2023-35885.json index 8579b219ce..00a4e52980 100644 --- a/2023/CVE-2023-35885.json +++ b/2023/CVE-2023-35885.json @@ -13,10 +13,10 @@ "description": "Cloudpanel 0-day Exploit", "fork": false, "created_at": "2023-06-08T09:20:22Z", - "updated_at": "2023-09-27T18:47:57Z", + "updated_at": "2023-10-14T17:05:33Z", "pushed_at": "2023-07-24T01:43:17Z", - "stargazers_count": 51, - "watchers_count": 51, + "stargazers_count": 52, + "watchers_count": 52, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 15, - "watchers": 51, + "watchers": 52, "score": 0, "subscribers_count": 2 } diff --git a/2023/CVE-2023-36723.json b/2023/CVE-2023-36723.json index a72348bded..944b96f7dd 100644 --- a/2023/CVE-2023-36723.json +++ b/2023/CVE-2023-36723.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2023-09-28T21:20:23Z", - "updated_at": "2023-10-14T10:22:42Z", + "updated_at": "2023-10-14T15:55:01Z", "pushed_at": "2023-10-10T17:29:32Z", - "stargazers_count": 49, - "watchers_count": 49, + "stargazers_count": 51, + "watchers_count": 51, "has_discussions": false, "forks_count": 10, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 10, - "watchers": 49, + "watchers": 51, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-36802.json b/2023/CVE-2023-36802.json index 3dd81a74bd..e5371beb70 100644 --- a/2023/CVE-2023-36802.json +++ b/2023/CVE-2023-36802.json @@ -13,19 +13,19 @@ "description": "LPE exploit for CVE-2023-36802", "fork": false, "created_at": "2023-10-09T17:32:15Z", - "updated_at": "2023-10-14T05:37:08Z", + "updated_at": "2023-10-14T13:16:54Z", "pushed_at": "2023-10-10T17:44:17Z", - "stargazers_count": 85, - "watchers_count": 85, + "stargazers_count": 87, + "watchers_count": 87, "has_discussions": false, - "forks_count": 25, + "forks_count": 26, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 25, - "watchers": 85, + "forks": 26, + "watchers": 87, "score": 0, "subscribers_count": 4 } diff --git a/2023/CVE-2023-3710.json b/2023/CVE-2023-3710.json index 7c7b2b5d2a..04eb931c3b 100644 --- a/2023/CVE-2023-3710.json +++ b/2023/CVE-2023-3710.json @@ -62,5 +62,35 @@ "watchers": 0, "score": 0, "subscribers_count": 0 + }, + { + "id": 704995768, + "name": "CVE-2023-3710", + "full_name": "CwEeR313\/CVE-2023-3710", + "owner": { + "login": "CwEeR313", + "id": 147943631, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/147943631?v=4", + "html_url": "https:\/\/github.com\/CwEeR313" + }, + "html_url": "https:\/\/github.com\/CwEeR313\/CVE-2023-3710", + "description": "exploit for CVE-2023-3710", + "fork": false, + "created_at": "2023-10-14T18:21:29Z", + "updated_at": "2023-10-14T18:21:29Z", + "pushed_at": "2023-10-14T18:21:29Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-38146.json b/2023/CVE-2023-38146.json index 7dacc2849a..72caf9adf3 100644 --- a/2023/CVE-2023-38146.json +++ b/2023/CVE-2023-38146.json @@ -43,8 +43,8 @@ "description": "PoC for the ThemeBleed Windows 11 CVE-2023-38146 written in python using impacket", "fork": false, "created_at": "2023-10-13T15:33:42Z", - "updated_at": "2023-10-13T15:38:38Z", - "pushed_at": "2023-10-14T08:33:49Z", + "updated_at": "2023-10-14T13:35:12Z", + "pushed_at": "2023-10-14T13:30:43Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, @@ -52,7 +52,16 @@ "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, - "topics": [], + "topics": [ + "cve-2023-38146", + "exploit", + "linux", + "poc", + "python", + "themebleed", + "windows", + "windows-11" + ], "visibility": "public", "forks": 0, "watchers": 0, diff --git a/2023/CVE-2023-38545.json b/2023/CVE-2023-38545.json index 89e7b13848..933e1c0c3f 100644 --- a/2023/CVE-2023-38545.json +++ b/2023/CVE-2023-38545.json @@ -73,10 +73,10 @@ "description": "Simple PoC causing overflow", "fork": false, "created_at": "2023-10-12T07:39:15Z", - "updated_at": "2023-10-14T06:19:49Z", + "updated_at": "2023-10-14T15:04:22Z", "pushed_at": "2023-10-12T08:09:01Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-38646.json b/2023/CVE-2023-38646.json index 6db0d8ccda..44da8ba872 100644 --- a/2023/CVE-2023-38646.json +++ b/2023/CVE-2023-38646.json @@ -668,5 +668,35 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 704953176, + "name": "CVE-2023-38646", + "full_name": "asepsaepdin\/CVE-2023-38646", + "owner": { + "login": "asepsaepdin", + "id": 122620685, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122620685?v=4", + "html_url": "https:\/\/github.com\/asepsaepdin" + }, + "html_url": "https:\/\/github.com\/asepsaepdin\/CVE-2023-38646", + "description": null, + "fork": false, + "created_at": "2023-10-14T15:56:18Z", + "updated_at": "2023-10-14T15:57:18Z", + "pushed_at": "2023-10-14T16:56:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-38831.json b/2023/CVE-2023-38831.json index 976454d85b..42cee43c43 100644 --- a/2023/CVE-2023-38831.json +++ b/2023/CVE-2023-38831.json @@ -43,10 +43,10 @@ "description": "CVE-2023-38831 winrar exploit generator", "fork": false, "created_at": "2023-08-25T09:44:08Z", - "updated_at": "2023-10-13T04:24:01Z", + "updated_at": "2023-10-14T12:56:24Z", "pushed_at": "2023-09-17T02:17:52Z", - "stargazers_count": 674, - "watchers_count": 674, + "stargazers_count": 675, + "watchers_count": 675, "has_discussions": false, "forks_count": 119, "allow_forking": true, @@ -59,7 +59,7 @@ ], "visibility": "public", "forks": 119, - "watchers": 674, + "watchers": 675, "score": 0, "subscribers_count": 8 }, diff --git a/2023/CVE-2023-42442.json b/2023/CVE-2023-42442.json index 785c6f7fec..e0ad6fa65c 100644 --- a/2023/CVE-2023-42442.json +++ b/2023/CVE-2023-42442.json @@ -43,19 +43,19 @@ "description": "JumpServer 堡垒机未授权综合漏洞利用, CVE-2023-42442 \/ CVE-2023-42820", "fork": false, "created_at": "2023-10-14T09:35:07Z", - "updated_at": "2023-10-14T12:03:37Z", - "pushed_at": "2023-10-14T10:25:14Z", - "stargazers_count": 2, - "watchers_count": 2, + "updated_at": "2023-10-14T14:54:09Z", + "pushed_at": "2023-10-14T15:49:37Z", + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, - "watchers": 2, + "forks": 1, + "watchers": 5, "score": 0, "subscribers_count": 0 } diff --git a/2023/CVE-2023-42820.json b/2023/CVE-2023-42820.json index 59129fc0c4..272c2fa57a 100644 --- a/2023/CVE-2023-42820.json +++ b/2023/CVE-2023-42820.json @@ -43,10 +43,10 @@ "description": "CVE-2023-42820", "fork": false, "created_at": "2023-10-10T06:32:51Z", - "updated_at": "2023-10-14T10:02:24Z", + "updated_at": "2023-10-14T14:42:00Z", "pushed_at": "2023-10-13T02:36:33Z", - "stargazers_count": 26, - "watchers_count": 26, + "stargazers_count": 27, + "watchers_count": 27, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 26, + "watchers": 27, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-44487.json b/2023/CVE-2023-44487.json index e6212768ea..9728a6d171 100644 --- a/2023/CVE-2023-44487.json +++ b/2023/CVE-2023-44487.json @@ -13,10 +13,10 @@ "description": "Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487", "fork": false, "created_at": "2023-10-10T14:20:42Z", - "updated_at": "2023-10-14T11:36:23Z", - "pushed_at": "2023-10-14T06:54:10Z", - "stargazers_count": 131, - "watchers_count": 131, + "updated_at": "2023-10-14T16:03:27Z", + "pushed_at": "2023-10-14T16:43:31Z", + "stargazers_count": 133, + "watchers_count": 133, "has_discussions": false, "forks_count": 28, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 28, - "watchers": 131, + "watchers": 133, "score": 0, "subscribers_count": 5 }, @@ -43,10 +43,10 @@ "description": "Proof of concept for DoS exploit ", "fork": false, "created_at": "2023-10-11T01:59:47Z", - "updated_at": "2023-10-14T02:05:37Z", + "updated_at": "2023-10-14T13:50:33Z", "pushed_at": "2023-10-13T11:19:10Z", - "stargazers_count": 22, - "watchers_count": 22, + "stargazers_count": 23, + "watchers_count": 23, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -63,7 +63,7 @@ ], "visibility": "public", "forks": 3, - "watchers": 22, + "watchers": 23, "score": 0, "subscribers_count": 2 }, @@ -141,19 +141,19 @@ "description": "Tool for testing mitigations and exposure to Rapid Reset DDoS (CVE-2023-44487)", "fork": false, "created_at": "2023-10-13T23:55:32Z", - "updated_at": "2023-10-14T08:53:44Z", + "updated_at": "2023-10-14T14:49:18Z", "pushed_at": "2023-10-14T00:08:56Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, - "watchers": 3, + "forks": 1, + "watchers": 4, "score": 0, "subscribers_count": 1 } diff --git a/2019/CVE-2019-14450.json b/2023/CVE-2023-45471.json similarity index 50% rename from 2019/CVE-2019-14450.json rename to 2023/CVE-2023-45471.json index d7a130bacd..bfd102e579 100644 --- a/2019/CVE-2019-14450.json +++ b/2023/CVE-2023-45471.json @@ -1,20 +1,20 @@ [ { - "id": 318244452, - "name": "CVE-2019-14450", - "full_name": "securifera\/CVE-2019-14450", + "id": 704942565, + "name": "CVE-2023-45471", + "full_name": "itsAptx\/CVE-2023-45471", "owner": { - "login": "securifera", - "id": 12126525, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12126525?v=4", - "html_url": "https:\/\/github.com\/securifera" + "login": "itsAptx", + "id": 62826765, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62826765?v=4", + "html_url": "https:\/\/github.com\/itsAptx" }, - "html_url": "https:\/\/github.com\/securifera\/CVE-2019-14450", + "html_url": "https:\/\/github.com\/itsAptx\/CVE-2023-45471", "description": null, "fork": false, - "created_at": "2020-12-03T15:54:39Z", - "updated_at": "2021-12-13T21:33:11Z", - "pushed_at": "2020-12-03T15:55:31Z", + "created_at": "2023-10-14T15:20:37Z", + "updated_at": "2023-10-14T16:46:59Z", + "pushed_at": "2023-10-14T16:43:01Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, @@ -27,6 +27,6 @@ "forks": 0, "watchers": 1, "score": 0, - "subscribers_count": 2 + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index cb6572c28f..3c22b1cde4 100644 --- a/README.md +++ b/README.md @@ -588,6 +588,7 @@ - [vpxuser/CVE-2023-3710-POC](https://github.com/vpxuser/CVE-2023-3710-POC) - [Mahdi22228/CVE-2023-3710](https://github.com/Mahdi22228/CVE-2023-3710) +- [CwEeR313/CVE-2023-3710](https://github.com/CwEeR313/CVE-2023-3710) ### CVE-2023-3711 (2023-09-12) @@ -3664,6 +3665,7 @@ - [nickswink/CVE-2023-38646](https://github.com/nickswink/CVE-2023-38646) - [passwa11/CVE-2023-38646](https://github.com/passwa11/CVE-2023-38646) - [threatHNTR/CVE-2023-38646](https://github.com/threatHNTR/CVE-2023-38646) +- [asepsaepdin/CVE-2023-38646](https://github.com/asepsaepdin/CVE-2023-38646) ### CVE-2023-38743 (2023-09-11) @@ -4478,6 +4480,9 @@ - [ggb0n/CVE-2023-44962](https://github.com/ggb0n/CVE-2023-44962) +### CVE-2023-45471 +- [itsAptx/CVE-2023-45471](https://github.com/itsAptx/CVE-2023-45471) + ### CVE-2023-45540 - [soundarkutty/CVE-2023-45540](https://github.com/soundarkutty/CVE-2023-45540) @@ -22914,13 +22919,6 @@ - [shanika04/cp30_XXE_partial_fix](https://github.com/shanika04/cp30_XXE_partial_fix) -### CVE-2019-5454 (2019-07-30) - -SQL Injection in the Nextcloud Android app prior to version 3.0.0 allows to destroy a local cache when a harmful query is executed requiring to resetup the account. - - -- [shanika04/nextcloud_android](https://github.com/shanika04/nextcloud_android) - ### CVE-2019-5475 (2019-09-03) The Nexus Yum Repository Plugin in v2 is vulnerable to Remote Code Execution when instances using CommandLineExecutor.java are supplied vulnerable data, such as the Yum Configuration Capability. @@ -24710,13 +24708,6 @@ - [jas502n/CVE-2019-14439](https://github.com/jas502n/CVE-2019-14439) -### CVE-2019-14450 (2019-10-28) - -A directory traversal vulnerability was discovered in RepetierServer.exe in Repetier-Server 0.8 through 0.91 that allows for the creation of a user controlled XML file at an unintended location. When this is combined with CVE-2019-14451, an attacker can upload an "external command" configuration as a printer configuration, and achieve remote code execution. After exploitation, loading of the external command configuration is dependent on a system reboot or service restart. - - -- [securifera/CVE-2019-14450](https://github.com/securifera/CVE-2019-14450) - ### CVE-2019-14514 (2020-02-10) An issue was discovered in Microvirt MEmu all versions prior to 7.0.2. A guest Android operating system inside the MEmu emulator contains a /system/bin/systemd binary that is run with root privileges on startup (this is unrelated to Red Hat's systemd init program, and is a closed-source proprietary tool that seems to be developed by Microvirt). This program opens TCP port 21509, presumably to receive installation-related commands from the host OS. Because everything after the installer:uninstall command is concatenated directly into a system() call, it is possible to execute arbitrary commands by supplying shell metacharacters. @@ -24835,7 +24826,6 @@ - [n0obit4/Webmin_1.890-POC](https://github.com/n0obit4/Webmin_1.890-POC) - [squid22/Webmin_CVE-2019-15107](https://github.com/squid22/Webmin_CVE-2019-15107) - [MuirlandOracle/CVE-2019-15107](https://github.com/MuirlandOracle/CVE-2019-15107) -- [diegojuan/CVE-2019-15107](https://github.com/diegojuan/CVE-2019-15107) - [whokilleddb/CVE-2019-15107](https://github.com/whokilleddb/CVE-2019-15107) - [puckiestyle/CVE-2019-15107](https://github.com/puckiestyle/CVE-2019-15107) - [darrenmartyn/CVE-2019-15107](https://github.com/darrenmartyn/CVE-2019-15107) @@ -25134,13 +25124,6 @@ - [maxpl0it/CVE-2019-17026-Exploit](https://github.com/maxpl0it/CVE-2019-17026-Exploit) - [lsw29475/CVE-2019-17026](https://github.com/lsw29475/CVE-2019-17026) -### CVE-2019-17041 (2019-10-07) - -An issue was discovered in Rsyslog v8.1908.0. contrib/pmaixforwardedfrom/pmaixforwardedfrom.c has a heap overflow in the parser for AIX log messages. The parser tries to locate a log message delimiter (in this case, a space or a colon) but fails to account for strings that do not satisfy this constraint. If the string does not match, then the variable lenMsg will reach the value zero and will skip the sanity check that detects invalid log messages. The message will then be considered valid, and the parser will eat up the nonexistent colon delimiter. In doing so, it will decrement lenMsg, a signed integer, whose value was zero and now becomes minus one. The following step in the parser is to shift left the contents of the message. To do this, it will call memmove with the right pointers to the target and destination strings, but the lenMsg will now be interpreted as a huge value, causing a heap overflow. - - -- [Resery/CVE-2019-17041](https://github.com/Resery/CVE-2019-17041) - ### CVE-2019-17080 (2019-10-02) mintinstall (aka Software Manager) 7.9.9 for Linux Mint allows code execution if a REVIEWS_CACHE file is controlled by an attacker, because an unpickle occurs. This is resolved in 8.0.0 and backports. @@ -35620,9 +35603,6 @@ - [amriunix/CVE-2007-2447](https://github.com/amriunix/CVE-2007-2447) - [Unix13/metasploitable2](https://github.com/Unix13/metasploitable2) -- [b1fair/smb_usermap](https://github.com/b1fair/smb_usermap) -- [JoseBarrios/CVE-2007-2447](https://github.com/JoseBarrios/CVE-2007-2447) -- [3x1t1um/CVE-2007-2447](https://github.com/3x1t1um/CVE-2007-2447) - [xlcc4096/exploit-CVE-2007-2447](https://github.com/xlcc4096/exploit-CVE-2007-2447) - [WildfootW/CVE-2007-2447_Samba_3.0.25rc3](https://github.com/WildfootW/CVE-2007-2447_Samba_3.0.25rc3) - [Ziemni/CVE-2007-2447-in-Python](https://github.com/Ziemni/CVE-2007-2447-in-Python) @@ -35646,13 +35626,6 @@ - [MikeRega7/CVE-2007-2447-RCE](https://github.com/MikeRega7/CVE-2007-2447-RCE) - [0xTabun/CVE-2007-2447](https://github.com/0xTabun/CVE-2007-2447) -### CVE-2007-3830 (2007-07-17) - -Cross-site scripting (XSS) vulnerability in alert.php in ISS Proventia Network IPS GX5108 1.3 and GX5008 1.5 allows remote attackers to inject arbitrary web script or HTML via the reminder parameter. - - -- [alt3kx/CVE-2007-3830](https://github.com/alt3kx/CVE-2007-3830) - ### CVE-2007-3831 (2007-07-17) PHP remote file inclusion in main.php in ISS Proventia Network IPS GX5108 1.3 and GX5008 1.5 allows remote attackers to execute arbitrary PHP code via a URL in the page parameter.