diff --git a/2014/CVE-2014-6271.json b/2014/CVE-2014-6271.json index f37f7d45af..8e6e5cb460 100644 --- a/2014/CVE-2014-6271.json +++ b/2014/CVE-2014-6271.json @@ -1120,12 +1120,12 @@ "description": "Shellshock exploit + vulnerable environment", "fork": false, "created_at": "2016-12-07T23:38:50Z", - "updated_at": "2023-04-14T17:53:51Z", + "updated_at": "2023-04-27T08:04:37Z", "pushed_at": "2017-10-30T22:46:11Z", "stargazers_count": 152, "watchers_count": 152, "has_discussions": false, - "forks_count": 56, + "forks_count": 57, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -1138,7 +1138,7 @@ "vulnerable-container" ], "visibility": "public", - "forks": 56, + "forks": 57, "watchers": 152, "score": 0 }, diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 94988fe695..76fe1ceb31 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-04-25T02:47:58Z", + "updated_at": "2023-04-27T07:40:26Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1668, - "watchers_count": 1668, + "stargazers_count": 1670, + "watchers_count": 1670, "has_discussions": false, "forks_count": 325, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 325, - "watchers": 1668, + "watchers": 1670, "score": 0 }, { diff --git a/2017/CVE-2017-1000405.json b/2017/CVE-2017-1000405.json index a8cb365a97..28b94d5065 100644 --- a/2017/CVE-2017-1000405.json +++ b/2017/CVE-2017-1000405.json @@ -13,10 +13,10 @@ "description": "A POC for the Huge Dirty Cow vulnerability (CVE-2017-1000405)", "fork": false, "created_at": "2017-11-29T22:19:51Z", - "updated_at": "2023-04-18T01:22:26Z", + "updated_at": "2023-04-27T08:18:29Z", "pushed_at": "2017-11-30T00:24:14Z", - "stargazers_count": 204, - "watchers_count": 204, + "stargazers_count": 203, + "watchers_count": 203, "has_discussions": false, "forks_count": 61, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 61, - "watchers": 204, + "watchers": 203, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index a3d41932c8..afa1f1576c 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -42,10 +42,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-04-25T02:47:58Z", + "updated_at": "2023-04-27T07:40:26Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1668, - "watchers_count": 1668, + "stargazers_count": 1670, + "watchers_count": 1670, "has_discussions": false, "forks_count": 325, "allow_forking": true, @@ -75,7 +75,7 @@ ], "visibility": "public", "forks": 325, - "watchers": 1668, + "watchers": 1670, "score": 0 }, { diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index a2bf806d05..d190dbeb17 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -568,10 +568,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-04-25T02:47:58Z", + "updated_at": "2023-04-27T07:40:26Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1668, - "watchers_count": 1668, + "stargazers_count": 1670, + "watchers_count": 1670, "has_discussions": false, "forks_count": 325, "allow_forking": true, @@ -601,7 +601,7 @@ ], "visibility": "public", "forks": 325, - "watchers": 1668, + "watchers": 1670, "score": 0 }, { diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index a1aaae1186..ea11f95d6d 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -187,10 +187,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-04-25T02:47:58Z", + "updated_at": "2023-04-27T07:40:26Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1668, - "watchers_count": 1668, + "stargazers_count": 1670, + "watchers_count": 1670, "has_discussions": false, "forks_count": 325, "allow_forking": true, @@ -220,7 +220,7 @@ ], "visibility": "public", "forks": 325, - "watchers": 1668, + "watchers": 1670, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-11113.json b/2020/CVE-2020-11113.json index 90bd2ba3d7..9372618400 100644 --- a/2020/CVE-2020-11113.json +++ b/2020/CVE-2020-11113.json @@ -13,10 +13,10 @@ "description": "CVE-2020-11113:Jackson-databind RCE", "fork": false, "created_at": "2020-05-21T14:00:33Z", - "updated_at": "2022-11-24T11:11:53Z", + "updated_at": "2023-04-27T07:50:29Z", "pushed_at": "2022-11-16T08:58:30Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 3, - "watchers": 3, + "watchers": 4, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-11547.json b/2020/CVE-2020-11547.json index 67f90d5f53..02f659ef5e 100644 --- a/2020/CVE-2020-11547.json +++ b/2020/CVE-2020-11547.json @@ -18,13 +18,13 @@ "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 2, "score": 0 } diff --git a/2020/CVE-2020-14883.json b/2020/CVE-2020-14883.json index f7214d355f..310d5b9f39 100644 --- a/2020/CVE-2020-14883.json +++ b/2020/CVE-2020-14883.json @@ -134,7 +134,7 @@ "stargazers_count": 1020, "watchers_count": 1020, "has_discussions": false, - "forks_count": 321, + "forks_count": 322, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -144,7 +144,7 @@ "poc" ], "visibility": "public", - "forks": 321, + "forks": 322, "watchers": 1020, "score": 0 } diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index 52d34ac502..9fb8ed51f1 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -894,13 +894,13 @@ "stargazers_count": 58, "watchers_count": 58, "has_discussions": false, - "forks_count": 7, + "forks_count": 8, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 7, + "forks": 8, "watchers": 58, "score": 0 } diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 5c374a0560..88ba6b4608 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-04-25T02:47:58Z", + "updated_at": "2023-04-27T07:40:26Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1668, - "watchers_count": 1668, + "stargazers_count": 1670, + "watchers_count": 1670, "has_discussions": false, "forks_count": 325, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 325, - "watchers": 1668, + "watchers": 1670, "score": 0 }, { diff --git a/2021/CVE-2021-1056.json b/2021/CVE-2021-1056.json deleted file mode 100644 index e9fcd6bc05..0000000000 --- a/2021/CVE-2021-1056.json +++ /dev/null @@ -1,35 +0,0 @@ -[ - { - "id": 327884232, - "name": "CVE-2021-1056", - "full_name": "pokerfaceSad\/CVE-2021-1056", - "owner": { - "login": "pokerfaceSad", - "id": 22297037, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22297037?v=4", - "html_url": "https:\/\/github.com\/pokerfaceSad" - }, - "html_url": "https:\/\/github.com\/pokerfaceSad\/CVE-2021-1056", - "description": "PoC for CVE-2021-1056, related to GPU Container Security", - "fork": false, - "created_at": "2021-01-08T11:29:48Z", - "updated_at": "2023-02-02T21:21:57Z", - "pushed_at": "2021-01-12T09:21:02Z", - "stargazers_count": 15, - "watchers_count": 15, - "has_discussions": false, - "forks_count": 6, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2021-1056", - "gpu-container", - "kubernetes-clusters" - ], - "visibility": "public", - "forks": 6, - "watchers": 15, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-1647.json b/2021/CVE-2021-1647.json deleted file mode 100644 index f15b8668f7..0000000000 --- a/2021/CVE-2021-1647.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 332213147, - "name": "cve-2021-1647", - "full_name": "findcool\/cve-2021-1647", - "owner": { - "login": "findcool", - "id": 73280456, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73280456?v=4", - "html_url": "https:\/\/github.com\/findcool" - }, - "html_url": "https:\/\/github.com\/findcool\/cve-2021-1647", - "description": null, - "fork": false, - "created_at": "2021-01-23T13:10:35Z", - "updated_at": "2021-01-23T13:10:37Z", - "pushed_at": "2021-01-20T14:55:37Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 5, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 5, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-2109.json b/2021/CVE-2021-2109.json index 32069adef1..af3df4327a 100644 --- a/2021/CVE-2021-2109.json +++ b/2021/CVE-2021-2109.json @@ -1,67 +1,4 @@ [ - { - "id": 331847444, - "name": "CVE-2021-2109", - "full_name": "Al1ex\/CVE-2021-2109", - "owner": { - "login": "Al1ex", - "id": 38161463, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4", - "html_url": "https:\/\/github.com\/Al1ex" - }, - "html_url": "https:\/\/github.com\/Al1ex\/CVE-2021-2109", - "description": "CVE-2021-2109 && Weblogic Server RCE via JNDI", - "fork": false, - "created_at": "2021-01-22T05:37:11Z", - "updated_at": "2023-04-20T00:39:24Z", - "pushed_at": "2021-01-22T05:52:26Z", - "stargazers_count": 32, - "watchers_count": 32, - "has_discussions": false, - "forks_count": 9, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2021-2109", - "jndi", - "rce", - "weblogic" - ], - "visibility": "public", - "forks": 9, - "watchers": 32, - "score": 0 - }, - { - "id": 331873303, - "name": "CVE-2021-2109", - "full_name": "rabbitsafe\/CVE-2021-2109", - "owner": { - "login": "rabbitsafe", - "id": 33046073, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33046073?v=4", - "html_url": "https:\/\/github.com\/rabbitsafe" - }, - "html_url": "https:\/\/github.com\/rabbitsafe\/CVE-2021-2109", - "description": null, - "fork": false, - "created_at": "2021-01-22T07:43:46Z", - "updated_at": "2022-11-09T18:10:56Z", - "pushed_at": "2021-01-22T08:34:11Z", - "stargazers_count": 10, - "watchers_count": 10, - "has_discussions": false, - "forks_count": 5, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 5, - "watchers": 10, - "score": 0 - }, { "id": 367086891, "name": "CVE-2021-2109_poc", diff --git a/2021/CVE-2021-2119.json b/2021/CVE-2021-2119.json index 4dcced9878..f1df3ac5d1 100644 --- a/2021/CVE-2021-2119.json +++ b/2021/CVE-2021-2119.json @@ -1,33 +1,4 @@ [ - { - "id": 329979678, - "name": "RWCTF21-VirtualBox-61-escape", - "full_name": "Sauercloud\/RWCTF21-VirtualBox-61-escape", - "owner": { - "login": "Sauercloud", - "id": 41395211, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41395211?v=4", - "html_url": "https:\/\/github.com\/Sauercloud" - }, - "html_url": "https:\/\/github.com\/Sauercloud\/RWCTF21-VirtualBox-61-escape", - "description": "0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020\/2021 CVE-2021-2119", - "fork": false, - "created_at": "2021-01-15T17:32:24Z", - "updated_at": "2023-01-18T03:40:05Z", - "pushed_at": "2021-01-23T01:25:22Z", - "stargazers_count": 130, - "watchers_count": 130, - "has_discussions": false, - "forks_count": 21, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 21, - "watchers": 130, - "score": 0 - }, { "id": 471867550, "name": "Sauercloude", diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index 3132895f5b..0cf54e7a1b 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -778,12 +778,12 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2023-04-26T09:12:46Z", + "updated_at": "2023-04-27T12:23:36Z", "pushed_at": "2022-12-15T04:07:54Z", - "stargazers_count": 898, - "watchers_count": 898, + "stargazers_count": 900, + "watchers_count": 900, "has_discussions": false, - "forks_count": 111, + "forks_count": 112, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -796,8 +796,8 @@ "vcenter" ], "visibility": "public", - "forks": 111, - "watchers": 898, + "forks": 112, + "watchers": 900, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-22555.json b/2021/CVE-2021-22555.json index 01cf12d562..baf28f6c02 100644 --- a/2021/CVE-2021-22555.json +++ b/2021/CVE-2021-22555.json @@ -13,10 +13,10 @@ "description": "CVE-2021-22555 Exploit", "fork": false, "created_at": "2021-07-16T01:54:01Z", - "updated_at": "2023-04-20T09:01:39Z", + "updated_at": "2023-04-27T11:35:48Z", "pushed_at": "2022-07-28T01:56:07Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 15, - "watchers": 4, + "watchers": 3, "score": 0 }, { diff --git a/2021/CVE-2021-25646.json b/2021/CVE-2021-25646.json index ba12447d1f..30d8d9eb79 100644 --- a/2021/CVE-2021-25646.json +++ b/2021/CVE-2021-25646.json @@ -134,7 +134,7 @@ "stargazers_count": 1020, "watchers_count": 1020, "has_discussions": false, - "forks_count": 321, + "forks_count": 322, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -144,7 +144,7 @@ "poc" ], "visibility": "public", - "forks": 321, + "forks": 322, "watchers": 1020, "score": 0 }, diff --git a/2021/CVE-2021-25741.json b/2021/CVE-2021-25741.json index ca01af5641..44bb894d2f 100644 --- a/2021/CVE-2021-25741.json +++ b/2021/CVE-2021-25741.json @@ -18,13 +18,13 @@ "stargazers_count": 24, "watchers_count": 24, "has_discussions": false, - "forks_count": 9, + "forks_count": 10, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 9, + "forks": 10, "watchers": 24, "score": 0 } diff --git a/2021/CVE-2021-26855.json b/2021/CVE-2021-26855.json index f1067e804d..c337831cbf 100644 --- a/2021/CVE-2021-26855.json +++ b/2021/CVE-2021-26855.json @@ -295,13 +295,13 @@ "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, - "forks_count": 74, + "forks_count": 75, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 74, + "forks": 75, "watchers": 1, "score": 0 }, @@ -733,7 +733,7 @@ "stargazers_count": 27, "watchers_count": 27, "has_discussions": false, - "forks_count": 8, + "forks_count": 9, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -743,7 +743,7 @@ "proxylogon" ], "visibility": "public", - "forks": 8, + "forks": 9, "watchers": 27, "score": 0 }, @@ -973,7 +973,7 @@ "stargazers_count": 116, "watchers_count": 116, "has_discussions": false, - "forks_count": 32, + "forks_count": 33, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -990,7 +990,7 @@ "zeroday" ], "visibility": "public", - "forks": 32, + "forks": 33, "watchers": 116, "score": 0 }, @@ -1158,13 +1158,13 @@ "stargazers_count": 166, "watchers_count": 166, "has_discussions": false, - "forks_count": 32, + "forks_count": 33, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 32, + "forks": 33, "watchers": 166, "score": 0 }, diff --git a/2021/CVE-2021-3019.json b/2021/CVE-2021-3019.json index 18764c0e79..31eb9b40bb 100644 --- a/2021/CVE-2021-3019.json +++ b/2021/CVE-2021-3019.json @@ -1,33 +1,4 @@ [ - { - "id": 328097281, - "name": "CVE-2021-3019", - "full_name": "B1anda0\/CVE-2021-3019", - "owner": { - "login": "B1anda0", - "id": 74232513, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74232513?v=4", - "html_url": "https:\/\/github.com\/B1anda0" - }, - "html_url": "https:\/\/github.com\/B1anda0\/CVE-2021-3019", - "description": "lanproxy 目录遍历漏洞批量检测 (CVE-2021-3019)", - "fork": false, - "created_at": "2021-01-09T07:11:38Z", - "updated_at": "2021-10-24T05:59:19Z", - "pushed_at": "2021-01-09T07:14:26Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 6, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 6, - "watchers": 4, - "score": 0 - }, { "id": 328546705, "name": "CVE-2021-3019", @@ -57,35 +28,6 @@ "watchers": 14, "score": 0 }, - { - "id": 329537345, - "name": "CVE-2021-3019", - "full_name": "Maksim-venus\/CVE-2021-3019", - "owner": { - "login": "Maksim-venus", - "id": 35008035, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35008035?v=4", - "html_url": "https:\/\/github.com\/Maksim-venus" - }, - "html_url": "https:\/\/github.com\/Maksim-venus\/CVE-2021-3019", - "description": "lanproxy 目录遍历漏洞批量检测用户名密码POC (CVE-2021-3019)", - "fork": false, - "created_at": "2021-01-14T07:19:21Z", - "updated_at": "2021-11-25T06:50:40Z", - "pushed_at": "2021-01-14T07:52:31Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 3, - "score": 0 - }, { "id": 346618078, "name": "CVE-2021-3019", diff --git a/2021/CVE-2021-31166.json b/2021/CVE-2021-31166.json index 05e8c53a84..e08fce43d1 100644 --- a/2021/CVE-2021-31166.json +++ b/2021/CVE-2021-31166.json @@ -13,10 +13,10 @@ "description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.", "fork": false, "created_at": "2021-05-16T16:15:56Z", - "updated_at": "2023-03-11T13:00:24Z", + "updated_at": "2023-04-27T06:28:20Z", "pushed_at": "2021-06-12T08:27:09Z", - "stargazers_count": 823, - "watchers_count": 823, + "stargazers_count": 824, + "watchers_count": 824, "has_discussions": false, "forks_count": 138, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 138, - "watchers": 823, + "watchers": 824, "score": 0 }, { diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json index 8d7a3ca91c..f32c52e587 100644 --- a/2021/CVE-2021-3129.json +++ b/2021/CVE-2021-3129.json @@ -28,93 +28,6 @@ "watchers": 234, "score": 0 }, - { - "id": 331843308, - "name": "CVE-2021-3129", - "full_name": "SNCKER\/CVE-2021-3129", - "owner": { - "login": "SNCKER", - "id": 49559334, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49559334?v=4", - "html_url": "https:\/\/github.com\/SNCKER" - }, - "html_url": "https:\/\/github.com\/SNCKER\/CVE-2021-3129", - "description": "Laravel debug rce", - "fork": false, - "created_at": "2021-01-22T05:12:21Z", - "updated_at": "2023-03-10T12:14:21Z", - "pushed_at": "2021-01-24T05:28:07Z", - "stargazers_count": 116, - "watchers_count": 116, - "has_discussions": false, - "forks_count": 53, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 53, - "watchers": 116, - "score": 0 - }, - { - "id": 332682252, - "name": "laravel-CVE-2021-3129-EXP", - "full_name": "SecPros-Team\/laravel-CVE-2021-3129-EXP", - "owner": { - "login": "SecPros-Team", - "id": 77960183, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77960183?v=4", - "html_url": "https:\/\/github.com\/SecPros-Team" - }, - "html_url": "https:\/\/github.com\/SecPros-Team\/laravel-CVE-2021-3129-EXP", - "description": null, - "fork": false, - "created_at": "2021-01-25T08:42:28Z", - "updated_at": "2023-04-06T01:58:13Z", - "pushed_at": "2021-01-25T08:49:59Z", - "stargazers_count": 55, - "watchers_count": 55, - "has_discussions": false, - "forks_count": 31, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 31, - "watchers": 55, - "score": 0 - }, - { - "id": 333316985, - "name": "Laravel_CVE-2021-3129_EXP", - "full_name": "crisprss\/Laravel_CVE-2021-3129_EXP", - "owner": { - "login": "crisprss", - "id": 55953931, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55953931?v=4", - "html_url": "https:\/\/github.com\/crisprss" - }, - "html_url": "https:\/\/github.com\/crisprss\/Laravel_CVE-2021-3129_EXP", - "description": null, - "fork": false, - "created_at": "2021-01-27T05:44:52Z", - "updated_at": "2022-11-09T18:11:00Z", - "pushed_at": "2021-01-27T06:23:34Z", - "stargazers_count": 17, - "watchers_count": 17, - "has_discussions": false, - "forks_count": 7, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 7, - "watchers": 17, - "score": 0 - }, { "id": 333380316, "name": "CVE-2021-3129_exploit", diff --git a/2021/CVE-2021-3130.json b/2021/CVE-2021-3130.json deleted file mode 100644 index 30740c437b..0000000000 --- a/2021/CVE-2021-3130.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 331557374, - "name": "CVE-2021-3130", - "full_name": "jet-pentest\/CVE-2021-3130", - "owner": { - "login": "jet-pentest", - "id": 71512502, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71512502?v=4", - "html_url": "https:\/\/github.com\/jet-pentest" - }, - "html_url": "https:\/\/github.com\/jet-pentest\/CVE-2021-3130", - "description": null, - "fork": false, - "created_at": "2021-01-21T08:04:32Z", - "updated_at": "2021-02-14T09:24:07Z", - "pushed_at": "2021-01-21T12:31:34Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-3131.json b/2021/CVE-2021-3131.json deleted file mode 100644 index 9fff24c7e9..0000000000 --- a/2021/CVE-2021-3131.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 329230328, - "name": "CVE-2021-3131", - "full_name": "jet-pentest\/CVE-2021-3131", - "owner": { - "login": "jet-pentest", - "id": 71512502, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71512502?v=4", - "html_url": "https:\/\/github.com\/jet-pentest" - }, - "html_url": "https:\/\/github.com\/jet-pentest\/CVE-2021-3131", - "description": "CVE-2021-3131", - "fork": false, - "created_at": "2021-01-13T07:41:25Z", - "updated_at": "2022-12-19T10:01:54Z", - "pushed_at": "2021-01-13T07:54:38Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index 120d1ea2d8..8a834323d9 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -1,33 +1,4 @@ [ - { - "id": 333199828, - "name": "CVE-2021-3156", - "full_name": "mr-r3b00t\/CVE-2021-3156", - "owner": { - "login": "mr-r3b00t", - "id": 14963690, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14963690?v=4", - "html_url": "https:\/\/github.com\/mr-r3b00t" - }, - "html_url": "https:\/\/github.com\/mr-r3b00t\/CVE-2021-3156", - "description": null, - "fork": false, - "created_at": "2021-01-26T19:53:04Z", - "updated_at": "2022-10-10T22:30:28Z", - "pushed_at": "2021-01-26T20:09:53Z", - "stargazers_count": 35, - "watchers_count": 35, - "has_discussions": false, - "forks_count": 32, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 32, - "watchers": 35, - "score": 0 - }, { "id": 333450928, "name": "sudo_cve-2021-3156", @@ -455,10 +426,10 @@ "description": null, "fork": false, "created_at": "2021-01-30T20:39:58Z", - "updated_at": "2023-04-21T21:25:23Z", + "updated_at": "2023-04-27T08:54:19Z", "pushed_at": "2021-02-02T17:07:09Z", - "stargazers_count": 867, - "watchers_count": 867, + "stargazers_count": 868, + "watchers_count": 868, "has_discussions": false, "forks_count": 239, "allow_forking": true, @@ -467,7 +438,7 @@ "topics": [], "visibility": "public", "forks": 239, - "watchers": 867, + "watchers": 868, "score": 0 }, { @@ -1044,13 +1015,13 @@ "stargazers_count": 585, "watchers_count": 585, "has_discussions": false, - "forks_count": 159, + "forks_count": 160, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 159, + "forks": 160, "watchers": 585, "score": 0 }, diff --git a/2021/CVE-2021-3164.json b/2021/CVE-2021-3164.json deleted file mode 100644 index 671a29b766..0000000000 --- a/2021/CVE-2021-3164.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 331173610, - "name": "cve-2021-3164", - "full_name": "rmccarth\/cve-2021-3164", - "owner": { - "login": "rmccarth", - "id": 36937649, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36937649?v=4", - "html_url": "https:\/\/github.com\/rmccarth" - }, - "html_url": "https:\/\/github.com\/rmccarth\/cve-2021-3164", - "description": "Church Rota version 2.6.4 is vulnerable to authenticated remote code execution. The user does not need to have file upload permission in order to upload and execute an arbitrary file. The application is written primarily with PHP so we use PHP in our PoC ", - "fork": false, - "created_at": "2021-01-20T02:48:46Z", - "updated_at": "2021-10-16T06:43:27Z", - "pushed_at": "2021-01-20T02:49:27Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index effc078549..56550a400e 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -77,19 +77,19 @@ "description": "CVE-2021-4034 1day", "fork": false, "created_at": "2022-01-25T23:51:37Z", - "updated_at": "2023-04-27T05:43:07Z", + "updated_at": "2023-04-27T08:26:37Z", "pushed_at": "2022-06-08T04:00:28Z", - "stargazers_count": 1797, - "watchers_count": 1797, + "stargazers_count": 1799, + "watchers_count": 1799, "has_discussions": false, - "forks_count": 510, + "forks_count": 511, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 510, - "watchers": 1797, + "forks": 511, + "watchers": 1799, "score": 0 }, { diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json index b7e4fed8d3..d08e053344 100644 --- a/2021/CVE-2021-41773.json +++ b/2021/CVE-2021-41773.json @@ -3355,7 +3355,7 @@ "description": "A little demonstration of cve-2021-41773 on httpd docker containers", "fork": false, "created_at": "2023-04-20T22:37:06Z", - "updated_at": "2023-04-21T18:30:27Z", + "updated_at": "2023-04-27T10:44:37Z", "pushed_at": "2023-04-21T18:36:48Z", "stargazers_count": 0, "watchers_count": 0, @@ -3364,7 +3364,10 @@ "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, - "topics": [], + "topics": [ + "cve-2021-41773", + "docker" + ], "visibility": "public", "forks": 0, "watchers": 0, diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json index 6926a3dbcd..ca8ac2eef9 100644 --- a/2021/CVE-2021-42278.json +++ b/2021/CVE-2021-42278.json @@ -13,10 +13,10 @@ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-11T15:10:30Z", - "updated_at": "2023-04-20T21:24:28Z", + "updated_at": "2023-04-27T09:27:39Z", "pushed_at": "2022-07-10T22:23:13Z", - "stargazers_count": 891, - "watchers_count": 891, + "stargazers_count": 892, + "watchers_count": 892, "has_discussions": false, "forks_count": 186, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 186, - "watchers": 891, + "watchers": 892, "score": 0 }, { diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 9c410854f2..0e368b48f3 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -3314,10 +3314,10 @@ "description": "Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)", "fork": false, "created_at": "2021-12-12T22:52:02Z", - "updated_at": "2023-03-14T11:35:57Z", + "updated_at": "2023-04-27T11:12:51Z", "pushed_at": "2021-12-20T15:34:21Z", - "stargazers_count": 343, - "watchers_count": 343, + "stargazers_count": 344, + "watchers_count": 344, "has_discussions": false, "forks_count": 50, "allow_forking": true, @@ -3326,7 +3326,7 @@ "topics": [], "visibility": "public", "forks": 50, - "watchers": 343, + "watchers": 344, "score": 0 }, { @@ -10827,35 +10827,6 @@ "watchers": 0, "score": 0 }, - { - "id": 450053162, - "name": "CVE-2021-44228-ScannersListFromRF", - "full_name": "semelnyk\/CVE-2021-44228-ScannersListFromRF", - "owner": { - "login": "semelnyk", - "id": 97104452, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97104452?v=4", - "html_url": "https:\/\/github.com\/semelnyk" - }, - "html_url": "https:\/\/github.com\/semelnyk\/CVE-2021-44228-ScannersListFromRF", - "description": null, - "fork": false, - "created_at": "2022-01-20T10:34:48Z", - "updated_at": "2023-02-09T08:14:37Z", - "pushed_at": "2022-01-20T10:53:58Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 452823928, "name": "log4j-polkit-poc", diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json index 5c576b5fb9..a3d5ade59d 100644 --- a/2022/CVE-2022-22954.json +++ b/2022/CVE-2022-22954.json @@ -709,12 +709,12 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2023-04-26T09:12:46Z", + "updated_at": "2023-04-27T12:23:36Z", "pushed_at": "2022-12-15T04:07:54Z", - "stargazers_count": 898, - "watchers_count": 898, + "stargazers_count": 900, + "watchers_count": 900, "has_discussions": false, - "forks_count": 111, + "forks_count": 112, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -727,8 +727,8 @@ "vcenter" ], "visibility": "public", - "forks": 111, - "watchers": 898, + "forks": 112, + "watchers": 900, "score": 0 }, { diff --git a/2022/CVE-2022-23222.json b/2022/CVE-2022-23222.json index ab8cf530cf..e165b4fd2c 100644 --- a/2022/CVE-2022-23222.json +++ b/2022/CVE-2022-23222.json @@ -42,10 +42,10 @@ "description": null, "fork": false, "created_at": "2022-06-22T14:01:50Z", - "updated_at": "2023-04-10T16:11:34Z", + "updated_at": "2023-04-27T12:26:57Z", "pushed_at": "2022-06-23T15:06:56Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 4, + "watchers": 5, "score": 0 }, { diff --git a/2022/CVE-2022-24715.json b/2022/CVE-2022-24715.json index ec1a853681..3c3f22181f 100644 --- a/2022/CVE-2022-24715.json +++ b/2022/CVE-2022-24715.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2023-03-20T04:31:32Z", "updated_at": "2023-04-26T03:35:18Z", - "pushed_at": "2023-04-27T02:53:26Z", + "pushed_at": "2023-04-27T08:43:59Z", "stargazers_count": 14, "watchers_count": 14, "has_discussions": false, diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index f0dac5ee5f..70fc39ca51 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -192,13 +192,13 @@ "stargazers_count": 31, "watchers_count": 31, "has_discussions": false, - "forks_count": 14, + "forks_count": 15, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 14, + "forks": 15, "watchers": 31, "score": 0 }, diff --git a/2022/CVE-2022-29464.json b/2022/CVE-2022-29464.json index 282fde7108..d4c21108c7 100644 --- a/2022/CVE-2022-29464.json +++ b/2022/CVE-2022-29464.json @@ -742,11 +742,11 @@ "html_url": "https:\/\/github.com\/Pari-Malam" }, "html_url": "https:\/\/github.com\/Pari-Malam\/CVE-2022-29464", - "description": "Perform With Mass Exploits WSO2", + "description": "Perform With Mass Exploits In WSO Management.", "fork": false, "created_at": "2023-04-25T09:45:18Z", - "updated_at": "2023-04-26T05:52:59Z", - "pushed_at": "2023-04-25T11:36:45Z", + "updated_at": "2023-04-27T11:20:39Z", + "pushed_at": "2023-04-27T11:16:35Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, diff --git a/2022/CVE-2022-37969.json b/2022/CVE-2022-37969.json index 62d992229a..8202e4ea2d 100644 --- a/2022/CVE-2022-37969.json +++ b/2022/CVE-2022-37969.json @@ -13,10 +13,10 @@ "description": "Windows LPE exploit for CVE-2022-37969", "fork": false, "created_at": "2023-03-09T21:17:44Z", - "updated_at": "2023-04-26T03:44:22Z", + "updated_at": "2023-04-27T09:14:31Z", "pushed_at": "2023-04-03T17:47:07Z", - "stargazers_count": 85, - "watchers_count": 85, + "stargazers_count": 86, + "watchers_count": 86, "has_discussions": false, "forks_count": 21, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 21, - "watchers": 85, + "watchers": 86, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-41852.json b/2022/CVE-2022-41852.json index 8ddcb884e5..214ea1df81 100644 --- a/2022/CVE-2022-41852.json +++ b/2022/CVE-2022-41852.json @@ -13,10 +13,10 @@ "description": "CVE-2022-41852 Proof of Concept (unofficial)", "fork": false, "created_at": "2022-10-14T12:09:19Z", - "updated_at": "2023-04-15T06:03:26Z", + "updated_at": "2023-04-27T09:13:49Z", "pushed_at": "2022-10-20T08:01:38Z", - "stargazers_count": 65, - "watchers_count": 65, + "stargazers_count": 66, + "watchers_count": 66, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -37,7 +37,7 @@ ], "visibility": "public", "forks": 15, - "watchers": 65, + "watchers": 66, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-44721.json b/2022/CVE-2022-44721.json index c8cec03d9b..3b809b5902 100644 --- a/2022/CVE-2022-44721.json +++ b/2022/CVE-2022-44721.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2022-12-03T11:04:17Z", - "updated_at": "2023-03-22T11:18:19Z", + "updated_at": "2023-04-27T12:12:52Z", "pushed_at": "2022-12-02T14:38:27Z", - "stargazers_count": 14, - "watchers_count": 14, + "stargazers_count": 15, + "watchers_count": 15, "has_discussions": false, "forks_count": 12, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 12, - "watchers": 14, + "watchers": 15, "score": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-1671.json b/2023/CVE-2023-1671.json index 48c56ccdcd..ca10c84d11 100644 --- a/2023/CVE-2023-1671.json +++ b/2023/CVE-2023-1671.json @@ -42,10 +42,10 @@ "description": "CVE-2023-1671-POC, based on dnslog platform", "fork": false, "created_at": "2023-04-24T15:53:42Z", - "updated_at": "2023-04-27T02:01:08Z", + "updated_at": "2023-04-27T12:24:04Z", "pushed_at": "2023-04-26T02:40:41Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -56,7 +56,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 9, + "watchers": 10, "score": 0 }, { diff --git a/2023/CVE-2023-21036.json b/2023/CVE-2023-21036.json index d67fac074d..b3989ca4bf 100644 --- a/2023/CVE-2023-21036.json +++ b/2023/CVE-2023-21036.json @@ -49,10 +49,10 @@ "description": "Detection and sanitization for Acropalypse Now - CVE-2023-21036", "fork": false, "created_at": "2023-03-22T14:59:42Z", - "updated_at": "2023-04-24T19:11:33Z", + "updated_at": "2023-04-27T10:13:24Z", "pushed_at": "2023-03-23T18:10:24Z", - "stargazers_count": 61, - "watchers_count": 61, + "stargazers_count": 62, + "watchers_count": 62, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -61,7 +61,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 61, + "watchers": 62, "score": 0 }, { diff --git a/2023/CVE-2023-21823.json b/2023/CVE-2023-21823.json index d340217c83..66e393a92f 100644 --- a/2023/CVE-2023-21823.json +++ b/2023/CVE-2023-21823.json @@ -18,13 +18,13 @@ "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 2, "score": 0 } diff --git a/2023/CVE-2023-21839.json b/2023/CVE-2023-21839.json index d92f38fb92..f00f0da489 100644 --- a/2023/CVE-2023-21839.json +++ b/2023/CVE-2023-21839.json @@ -13,10 +13,10 @@ "description": "Weblogic CVE-2023-21839 \/ CVE-2023-21931 \/ CVE-2023-21979 一键检测", "fork": false, "created_at": "2023-02-13T03:42:27Z", - "updated_at": "2023-04-27T06:12:48Z", + "updated_at": "2023-04-27T06:33:22Z", "pushed_at": "2023-04-23T17:54:49Z", - "stargazers_count": 534, - "watchers_count": 534, + "stargazers_count": 535, + "watchers_count": 535, "has_discussions": false, "forks_count": 82, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 82, - "watchers": 534, + "watchers": 535, "score": 0 }, { diff --git a/2023/CVE-2023-22621.json b/2023/CVE-2023-22621.json index 8513690c61..cfae5b5ae4 100644 --- a/2023/CVE-2023-22621.json +++ b/2023/CVE-2023-22621.json @@ -13,19 +13,19 @@ "description": "CVE-2023-22621: SSTI to RCE by Exploiting Email Templates affecting Strapi Versions <=4.5.5", "fork": false, "created_at": "2023-04-25T15:50:05Z", - "updated_at": "2023-04-27T03:54:21Z", + "updated_at": "2023-04-27T09:29:57Z", "pushed_at": "2023-04-25T16:25:22Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, - "watchers": 8, + "forks": 1, + "watchers": 9, "score": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-23397.json b/2023/CVE-2023-23397.json index c49ec710ac..773ef16d33 100644 --- a/2023/CVE-2023-23397.json +++ b/2023/CVE-2023-23397.json @@ -400,10 +400,10 @@ "description": "Simple PoC of the CVE-2023-23397 vulnerability with the payload sent by email.", "fork": false, "created_at": "2023-03-20T16:31:54Z", - "updated_at": "2023-04-15T23:55:27Z", + "updated_at": "2023-04-27T07:23:06Z", "pushed_at": "2023-03-24T10:46:38Z", - "stargazers_count": 70, - "watchers_count": 70, + "stargazers_count": 71, + "watchers_count": 71, "has_discussions": false, "forks_count": 19, "allow_forking": true, @@ -414,7 +414,7 @@ ], "visibility": "public", "forks": 19, - "watchers": 70, + "watchers": 71, "score": 0 }, { diff --git a/2023/CVE-2023-23752.json b/2023/CVE-2023-23752.json index 85164fb604..e2bd6df16a 100644 --- a/2023/CVE-2023-23752.json +++ b/2023/CVE-2023-23752.json @@ -612,11 +612,11 @@ "html_url": "https:\/\/github.com\/Pari-Malam" }, "html_url": "https:\/\/github.com\/Pari-Malam\/CVE-2023-23752", - "description": "Perform with Dork Scanner and Massive with Joomla 4.2.8", + "description": "Perform With Mass Exploiter In Joomla 4.2.8.", "fork": false, "created_at": "2023-04-09T13:20:48Z", - "updated_at": "2023-04-24T02:21:16Z", - "pushed_at": "2023-04-25T11:45:35Z", + "updated_at": "2023-04-27T11:21:00Z", + "pushed_at": "2023-04-27T11:16:00Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, diff --git a/2023/CVE-2023-27350.json b/2023/CVE-2023-27350.json index 2b0d8af04d..5577464f1d 100644 --- a/2023/CVE-2023-27350.json +++ b/2023/CVE-2023-27350.json @@ -71,19 +71,19 @@ "description": "Proof of Concept Exploit for PaperCut CVE-2023-27350", "fork": false, "created_at": "2023-04-22T21:34:06Z", - "updated_at": "2023-04-27T01:57:06Z", + "updated_at": "2023-04-27T07:46:42Z", "pushed_at": "2023-04-22T21:50:35Z", - "stargazers_count": 25, - "watchers_count": 25, + "stargazers_count": 26, + "watchers_count": 26, "has_discussions": false, - "forks_count": 7, + "forks_count": 8, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 7, - "watchers": 25, + "forks": 8, + "watchers": 26, "score": 0 }, { diff --git a/2023/CVE-2023-27524.json b/2023/CVE-2023-27524.json index 8ecc17bdab..ebda703046 100644 --- a/2023/CVE-2023-27524.json +++ b/2023/CVE-2023-27524.json @@ -13,10 +13,10 @@ "description": "Basic PoC for CVE-2023-27524: Insecure Default Configuration in Apache Superset", "fork": false, "created_at": "2023-04-25T04:59:05Z", - "updated_at": "2023-04-27T04:05:52Z", + "updated_at": "2023-04-27T12:23:45Z", "pushed_at": "2023-04-25T12:00:05Z", - "stargazers_count": 27, - "watchers_count": 27, + "stargazers_count": 31, + "watchers_count": 31, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 27, + "watchers": 31, "score": 0 }, { @@ -42,8 +42,8 @@ "description": "Apahce-Superset身份认证绕过漏洞(CVE-2023-27524)检测工具", "fork": false, "created_at": "2023-04-27T06:21:00Z", - "updated_at": "2023-04-27T06:21:01Z", - "pushed_at": "2023-04-27T06:21:01Z", + "updated_at": "2023-04-27T06:33:59Z", + "pushed_at": "2023-04-27T06:34:33Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, @@ -56,5 +56,34 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 633292629, + "name": "CVE-2023-27524", + "full_name": "antx-code\/CVE-2023-27524", + "owner": { + "login": "antx-code", + "id": 7877940, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7877940?v=4", + "html_url": "https:\/\/github.com\/antx-code" + }, + "html_url": "https:\/\/github.com\/antx-code\/CVE-2023-27524", + "description": "Apache Superset Auth Bypass Vulnerability CVE-2023-27524.", + "fork": false, + "created_at": "2023-04-27T07:31:40Z", + "updated_at": "2023-04-27T07:38:24Z", + "pushed_at": "2023-04-27T07:31:58Z", + "stargazers_count": 2, + "watchers_count": 2, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 2, + "score": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-29007.json b/2023/CVE-2023-29007.json index c73438a384..08d4a97f87 100644 --- a/2023/CVE-2023-29007.json +++ b/2023/CVE-2023-29007.json @@ -13,12 +13,12 @@ "description": "PoC repository for CVE-2023-29007", "fork": false, "created_at": "2023-04-26T14:00:11Z", - "updated_at": "2023-04-27T05:35:17Z", + "updated_at": "2023-04-27T09:15:33Z", "pushed_at": "2023-04-26T14:21:51Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, - "forks_count": 3, + "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -26,8 +26,8 @@ "cve" ], "visibility": "public", - "forks": 3, - "watchers": 6, + "forks": 5, + "watchers": 7, "score": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-30839.json b/2023/CVE-2023-30839.json new file mode 100644 index 0000000000..56a9be4677 --- /dev/null +++ b/2023/CVE-2023-30839.json @@ -0,0 +1,31 @@ +[ + { + "id": 633389042, + "name": "https-nvd.nist.gov-vuln-detail-CVE-2023-30839", + "full_name": "drkbcn\/https-nvd.nist.gov-vuln-detail-CVE-2023-30839", + "owner": { + "login": "drkbcn", + "id": 2090227, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2090227?v=4", + "html_url": "https:\/\/github.com\/drkbcn" + }, + "html_url": "https:\/\/github.com\/drkbcn\/https-nvd.nist.gov-vuln-detail-CVE-2023-30839", + "description": "PrestaShop <1.7.8.9 Fix for CVE-2023-30839", + "fork": false, + "created_at": "2023-04-27T11:49:13Z", + "updated_at": "2023-04-27T11:49:13Z", + "pushed_at": "2023-04-27T11:49:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/README.md b/README.md index efea254bf4..07bd5eca8e 100644 --- a/README.md +++ b/README.md @@ -802,6 +802,7 @@ Session Validation attacks in Apache Superset versions up to and including 2.0.1 - [horizon3ai/CVE-2023-27524](https://github.com/horizon3ai/CVE-2023-27524) - [Okaytc/Superset_auth_bypass_check](https://github.com/Okaytc/Superset_auth_bypass_check) +- [antx-code/CVE-2023-27524](https://github.com/antx-code/CVE-2023-27524) ### CVE-2023-27532 (2023-03-10) @@ -960,6 +961,14 @@ SmartPTT SCADA 1.1.0.0 allows remote code execution (when the attacker has admin - [Toxich4/CVE-2023-30459](https://github.com/Toxich4/CVE-2023-30459) +### CVE-2023-30839 (2023-04-25) + +<code> +PrestaShop is an Open Source e-commerce web application. Versions prior to 8.0.4 and 1.7.8.9 contain a SQL filtering vulnerability. A BO user can write, update, and delete in the database, even without having specific rights. PrestaShop 8.0.4 and 1.7.8.9 contain a patch for this issue. There are no known workarounds. +</code> + +- [drkbcn/https-nvd.nist.gov-vuln-detail-CVE-2023-30839](https://github.com/drkbcn/https-nvd.nist.gov-vuln-detail-CVE-2023-30839) + ## 2022 ### CVE-2022-0185 (2022-02-11) @@ -7825,14 +7834,6 @@ In onCreate of KeyChainActivity.java, there is a possible way to use an app cert ### CVE-2021-403 - [rhysmcneill/CVE-2021-403](https://github.com/rhysmcneill/CVE-2021-403) -### CVE-2021-1056 (2021-01-07) - -<code> -NVIDIA GPU Display Driver for Linux, all versions, contains a vulnerability in the kernel mode layer (nvidia.ko) in which it does not completely honor operating system file system permissions to provide GPU device-level isolation, which may lead to denial of service or information disclosure. -</code> - -- [pokerfaceSad/CVE-2021-1056](https://github.com/pokerfaceSad/CVE-2021-1056) - ### CVE-2021-1480 (2021-04-08) <code> @@ -7865,14 +7866,6 @@ Microsoft SQL Elevation of Privilege Vulnerability - [Nate0634034090/bug-free-memory](https://github.com/Nate0634034090/bug-free-memory) -### CVE-2021-1647 (2021-01-12) - -<code> -Microsoft Defender Remote Code Execution Vulnerability -</code> - -- [findcool/cve-2021-1647](https://github.com/findcool/cve-2021-1647) - ### CVE-2021-1656 (2021-01-12) <code> @@ -8005,8 +7998,6 @@ Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Op Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). </code> -- [Al1ex/CVE-2021-2109](https://github.com/Al1ex/CVE-2021-2109) -- [rabbitsafe/CVE-2021-2109](https://github.com/rabbitsafe/CVE-2021-2109) - [yuaneuro/CVE-2021-2109_poc](https://github.com/yuaneuro/CVE-2021-2109_poc) - [dinosn/CVE-2021-2109](https://github.com/dinosn/CVE-2021-2109) - [coco0x0a/CVE-2021-2109](https://github.com/coco0x0a/CVE-2021-2109) @@ -8018,7 +8009,6 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.18. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N). </code> -- [Sauercloud/RWCTF21-VirtualBox-61-escape](https://github.com/Sauercloud/RWCTF21-VirtualBox-61-escape) - [chatbottesisgmailh/Sauercloude](https://github.com/chatbottesisgmailh/Sauercloude) - [shi10587s/Sauercloude](https://github.com/shi10587s/Sauercloude) @@ -8089,9 +8079,7 @@ Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connec ffay lanproxy 0.1 allows Directory Traversal to read /../conf/config.properties to obtain credentials for a connection to the intranet. </code> -- [B1anda0/CVE-2021-3019](https://github.com/B1anda0/CVE-2021-3019) - [0xf4n9x/CVE-2021-3019](https://github.com/0xf4n9x/CVE-2021-3019) -- [Maksim-venus/CVE-2021-3019](https://github.com/Maksim-venus/CVE-2021-3019) - [murataydemir/CVE-2021-3019](https://github.com/murataydemir/CVE-2021-3019) - [Aoyuh/cve-2021-3019](https://github.com/Aoyuh/cve-2021-3019) - [givemefivw/CVE-2021-3019](https://github.com/givemefivw/CVE-2021-3019) @@ -8120,9 +8108,6 @@ Ignition before 2.5.2, as used in Laravel and other products, allows unauthentic </code> - [ambionics/laravel-exploits](https://github.com/ambionics/laravel-exploits) -- [SNCKER/CVE-2021-3129](https://github.com/SNCKER/CVE-2021-3129) -- [SecPros-Team/laravel-CVE-2021-3129-EXP](https://github.com/SecPros-Team/laravel-CVE-2021-3129-EXP) -- [crisprss/Laravel_CVE-2021-3129_EXP](https://github.com/crisprss/Laravel_CVE-2021-3129_EXP) - [nth347/CVE-2021-3129_exploit](https://github.com/nth347/CVE-2021-3129_exploit) - [FunPhishing/Laravel-8.4.2-rce-CVE-2021-3129](https://github.com/FunPhishing/Laravel-8.4.2-rce-CVE-2021-3129) - [zhzyker/CVE-2021-3129](https://github.com/zhzyker/CVE-2021-3129) @@ -8139,22 +8124,6 @@ Ignition before 2.5.2, as used in Laravel and other products, allows unauthentic - [keyuan15/CVE-2021-3129](https://github.com/keyuan15/CVE-2021-3129) - [qaisarafridi/cve-2021-3129](https://github.com/qaisarafridi/cve-2021-3129) -### CVE-2021-3130 (2021-01-20) - -<code> -Within the Open-AudIT up to version 3.5.3 application, the web interface hides SSH secrets, Windows passwords, and SNMP strings from users using HTML 'password field' obfuscation. By using Developer tools or similar, it is possible to change the obfuscation so that the credentials are visible. -</code> - -- [jet-pentest/CVE-2021-3130](https://github.com/jet-pentest/CVE-2021-3130) - -### CVE-2021-3131 (2021-01-13) - -<code> -The Web server in 1C:Enterprise 8 before 8.3.17.1851 sends base64 encoded credentials in the creds URL parameter. -</code> - -- [jet-pentest/CVE-2021-3131](https://github.com/jet-pentest/CVE-2021-3131) - ### CVE-2021-3138 (2021-01-13) <code> @@ -8169,7 +8138,6 @@ In Discourse 2.7.0 through beta1, a rate-limit bypass leads to a bypass of the 2 Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character. </code> -- [mr-r3b00t/CVE-2021-3156](https://github.com/mr-r3b00t/CVE-2021-3156) - [nexcess/sudo_cve-2021-3156](https://github.com/nexcess/sudo_cve-2021-3156) - [reverse-ex/CVE-2021-3156](https://github.com/reverse-ex/CVE-2021-3156) - [unauth401/CVE-2021-3156](https://github.com/unauth401/CVE-2021-3156) @@ -8238,14 +8206,6 @@ Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based ### CVE-2021-3157 - [CrackerCat/cve-2021-3157](https://github.com/CrackerCat/cve-2021-3157) -### CVE-2021-3164 (2021-01-21) - -<code> -ChurchRota 2.6.4 is vulnerable to authenticated remote code execution. The user does not need to have file upload permission in order to upload and execute an arbitrary file via a POST request to resources.php. -</code> - -- [rmccarth/cve-2021-3164](https://github.com/rmccarth/cve-2021-3164) - ### CVE-2021-3165 (2021-01-26) <code> @@ -13513,7 +13473,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12 - [arnaudluti/PS-CVE-2021-44228](https://github.com/arnaudluti/PS-CVE-2021-44228) - [ColdFusionX/CVE-2021-44228-Log4Shell-POC](https://github.com/ColdFusionX/CVE-2021-44228-Log4Shell-POC) - [robrankin/cve-2021-44228-waf-tests](https://github.com/robrankin/cve-2021-44228-waf-tests) -- [semelnyk/CVE-2021-44228-ScannersListFromRF](https://github.com/semelnyk/CVE-2021-44228-ScannersListFromRF) - [0xalwayslucky/log4j-polkit-poc](https://github.com/0xalwayslucky/log4j-polkit-poc) - [y-security/yLog4j](https://github.com/y-security/yLog4j) - [FeryaelJustice/Log4Shell](https://github.com/FeryaelJustice/Log4Shell)