diff --git a/2010/CVE-2010-1240.json b/2010/CVE-2010-1240.json
index f35de64a61..562bfa65b5 100644
--- a/2010/CVE-2010-1240.json
+++ b/2010/CVE-2010-1240.json
@@ -13,10 +13,10 @@
"description": "This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actually consists of embedded payload. The exploit was made public as CVE-2010-1240. ",
"fork": false,
"created_at": "2021-06-05T18:59:28Z",
- "updated_at": "2023-08-17T03:47:42Z",
+ "updated_at": "2023-08-22T04:18:46Z",
"pushed_at": "2021-06-06T09:41:51Z",
- "stargazers_count": 23,
- "watchers_count": 23,
+ "stargazers_count": 24,
+ "watchers_count": 24,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
- "watchers": 23,
+ "watchers": 24,
"score": 0,
"subscribers_count": 2
},
diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json
index e864f77f14..859f8be8ec 100644
--- a/2014/CVE-2014-4210.json
+++ b/2014/CVE-2014-4210.json
@@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2023-08-21T10:32:48Z",
+ "updated_at": "2023-08-22T02:00:00Z",
"pushed_at": "2022-07-17T12:41:46Z",
- "stargazers_count": 1771,
- "watchers_count": 1771,
+ "stargazers_count": 1773,
+ "watchers_count": 1773,
"has_discussions": false,
"forks_count": 330,
"allow_forking": true,
@@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 330,
- "watchers": 1771,
+ "watchers": 1773,
"score": 0,
"subscribers_count": 34
},
diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json
index 57d68030da..c960c71202 100644
--- a/2016/CVE-2016-0638.json
+++ b/2016/CVE-2016-0638.json
@@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2023-08-21T10:32:48Z",
+ "updated_at": "2023-08-22T02:00:00Z",
"pushed_at": "2022-07-17T12:41:46Z",
- "stargazers_count": 1771,
- "watchers_count": 1771,
+ "stargazers_count": 1773,
+ "watchers_count": 1773,
"has_discussions": false,
"forks_count": 330,
"allow_forking": true,
@@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 330,
- "watchers": 1771,
+ "watchers": 1773,
"score": 0,
"subscribers_count": 34
},
diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json
index 6e040b09bd..04be711554 100644
--- a/2017/CVE-2017-3248.json
+++ b/2017/CVE-2017-3248.json
@@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2023-08-21T10:32:48Z",
+ "updated_at": "2023-08-22T02:00:00Z",
"pushed_at": "2022-07-17T12:41:46Z",
- "stargazers_count": 1771,
- "watchers_count": 1771,
+ "stargazers_count": 1773,
+ "watchers_count": 1773,
"has_discussions": false,
"forks_count": 330,
"allow_forking": true,
@@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 330,
- "watchers": 1771,
+ "watchers": 1773,
"score": 0,
"subscribers_count": 34
},
diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json
index 19974ab842..5736eaf3c9 100644
--- a/2018/CVE-2018-2628.json
+++ b/2018/CVE-2018-2628.json
@@ -587,10 +587,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2023-08-21T10:32:48Z",
+ "updated_at": "2023-08-22T02:00:00Z",
"pushed_at": "2022-07-17T12:41:46Z",
- "stargazers_count": 1771,
- "watchers_count": 1771,
+ "stargazers_count": 1773,
+ "watchers_count": 1773,
"has_discussions": false,
"forks_count": 330,
"allow_forking": true,
@@ -620,7 +620,7 @@
],
"visibility": "public",
"forks": 330,
- "watchers": 1771,
+ "watchers": 1773,
"score": 0,
"subscribers_count": 34
},
diff --git a/2018/CVE-2018-7600.json b/2018/CVE-2018-7600.json
index 73cecf5a7e..fe0e01a03d 100644
--- a/2018/CVE-2018-7600.json
+++ b/2018/CVE-2018-7600.json
@@ -363,10 +363,10 @@
"description": "Exploit for Drupal 7 <= 7.57 CVE-2018-7600",
"fork": false,
"created_at": "2018-04-17T15:38:15Z",
- "updated_at": "2023-08-20T11:49:07Z",
+ "updated_at": "2023-08-22T05:28:46Z",
"pushed_at": "2018-04-26T15:40:28Z",
- "stargazers_count": 109,
- "watchers_count": 109,
+ "stargazers_count": 110,
+ "watchers_count": 110,
"has_discussions": false,
"forks_count": 65,
"allow_forking": true,
@@ -375,7 +375,7 @@
"topics": [],
"visibility": "public",
"forks": 65,
- "watchers": 109,
+ "watchers": 110,
"score": 0,
"subscribers_count": 5
},
diff --git a/2018/CVE-2018-9995.json b/2018/CVE-2018-9995.json
index c576846fcc..e3ad1a54a2 100644
--- a/2018/CVE-2018-9995.json
+++ b/2018/CVE-2018-9995.json
@@ -613,10 +613,10 @@
"description": "A PoC exploit for CVE-2018-9995 - DVR Authentication Bypass",
"fork": false,
"created_at": "2023-08-18T19:42:17Z",
- "updated_at": "2023-08-18T20:00:32Z",
+ "updated_at": "2023-08-22T00:24:50Z",
"pushed_at": "2023-08-21T18:24:16Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "stargazers_count": 1,
+ "watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@@ -634,7 +634,7 @@
],
"visibility": "public",
"forks": 2,
- "watchers": 0,
+ "watchers": 1,
"score": 0,
"subscribers_count": 1
}
diff --git a/2019/CVE-2019-15107.json b/2019/CVE-2019-15107.json
index ec2772ab94..d92914c550 100644
--- a/2019/CVE-2019-15107.json
+++ b/2019/CVE-2019-15107.json
@@ -936,7 +936,7 @@
"fork": false,
"created_at": "2023-08-19T05:41:39Z",
"updated_at": "2023-08-19T05:41:39Z",
- "pushed_at": "2023-08-19T09:34:05Z",
+ "pushed_at": "2023-08-22T05:59:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json
index 72037126b2..766284c41e 100644
--- a/2019/CVE-2019-17558.json
+++ b/2019/CVE-2019-17558.json
@@ -43,10 +43,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
- "updated_at": "2023-08-21T13:04:32Z",
+ "updated_at": "2023-08-22T05:46:36Z",
"pushed_at": "2021-04-04T09:13:57Z",
- "stargazers_count": 3848,
- "watchers_count": 3848,
+ "stargazers_count": 3849,
+ "watchers_count": 3849,
"has_discussions": false,
"forks_count": 1085,
"allow_forking": true,
@@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 1085,
- "watchers": 3848,
+ "watchers": 3849,
"score": 0,
"subscribers_count": 155
},
diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json
index 1e90935666..d6416e5c55 100644
--- a/2019/CVE-2019-2618.json
+++ b/2019/CVE-2019-2618.json
@@ -193,10 +193,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2023-08-21T10:32:48Z",
+ "updated_at": "2023-08-22T02:00:00Z",
"pushed_at": "2022-07-17T12:41:46Z",
- "stargazers_count": 1771,
- "watchers_count": 1771,
+ "stargazers_count": 1773,
+ "watchers_count": 1773,
"has_discussions": false,
"forks_count": 330,
"allow_forking": true,
@@ -226,7 +226,7 @@
],
"visibility": "public",
"forks": 330,
- "watchers": 1771,
+ "watchers": 1773,
"score": 0,
"subscribers_count": 34
}
diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json
index ac577d3558..06b31d5221 100644
--- a/2020/CVE-2020-14882.json
+++ b/2020/CVE-2020-14882.json
@@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
- "updated_at": "2023-08-21T13:04:32Z",
+ "updated_at": "2023-08-22T05:46:36Z",
"pushed_at": "2021-04-04T09:13:57Z",
- "stargazers_count": 3848,
- "watchers_count": 3848,
+ "stargazers_count": 3849,
+ "watchers_count": 3849,
"has_discussions": false,
"forks_count": 1085,
"allow_forking": true,
@@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1085,
- "watchers": 3848,
+ "watchers": 3849,
"score": 0,
"subscribers_count": 155
},
diff --git a/2020/CVE-2020-16938.json b/2020/CVE-2020-16938.json
index 0ab5eba23c..4d7a3b3011 100644
--- a/2020/CVE-2020-16938.json
+++ b/2020/CVE-2020-16938.json
@@ -13,10 +13,10 @@
"description": "Bypassing NTFS permissions to read any files as unprivileged user.",
"fork": false,
"created_at": "2020-10-21T15:38:22Z",
- "updated_at": "2023-07-11T23:22:56Z",
+ "updated_at": "2023-08-22T01:51:20Z",
"pushed_at": "2020-10-21T15:39:00Z",
- "stargazers_count": 184,
- "watchers_count": 184,
+ "stargazers_count": 185,
+ "watchers_count": 185,
"has_discussions": false,
"forks_count": 40,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 40,
- "watchers": 184,
+ "watchers": 185,
"score": 0,
"subscribers_count": 10
}
diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json
index 88c66ae86a..78490676a6 100644
--- a/2020/CVE-2020-2551.json
+++ b/2020/CVE-2020-2551.json
@@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2023-08-21T10:32:48Z",
+ "updated_at": "2023-08-22T02:00:00Z",
"pushed_at": "2022-07-17T12:41:46Z",
- "stargazers_count": 1771,
- "watchers_count": 1771,
+ "stargazers_count": 1773,
+ "watchers_count": 1773,
"has_discussions": false,
"forks_count": 330,
"allow_forking": true,
@@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 330,
- "watchers": 1771,
+ "watchers": 1773,
"score": 0,
"subscribers_count": 34
},
diff --git a/2020/CVE-2020-2883.json b/2020/CVE-2020-2883.json
index 4524cdad7b..ca0fa745ce 100644
--- a/2020/CVE-2020-2883.json
+++ b/2020/CVE-2020-2883.json
@@ -108,10 +108,10 @@
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell",
"fork": false,
"created_at": "2020-08-19T03:34:06Z",
- "updated_at": "2023-08-21T02:01:57Z",
+ "updated_at": "2023-08-22T01:38:07Z",
"pushed_at": "2020-08-25T03:17:32Z",
- "stargazers_count": 518,
- "watchers_count": 518,
+ "stargazers_count": 519,
+ "watchers_count": 519,
"has_discussions": false,
"forks_count": 65,
"allow_forking": true,
@@ -120,7 +120,7 @@
"topics": [],
"visibility": "public",
"forks": 65,
- "watchers": 518,
+ "watchers": 519,
"score": 0,
"subscribers_count": 9
},
diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json
index 199d1fe22c..b6708f608f 100644
--- a/2021/CVE-2021-1675.json
+++ b/2021/CVE-2021-1675.json
@@ -43,10 +43,10 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
- "updated_at": "2023-08-18T20:48:04Z",
+ "updated_at": "2023-08-22T04:03:12Z",
"pushed_at": "2021-07-20T15:28:13Z",
- "stargazers_count": 1729,
- "watchers_count": 1729,
+ "stargazers_count": 1730,
+ "watchers_count": 1730,
"has_discussions": false,
"forks_count": 589,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 589,
- "watchers": 1729,
+ "watchers": 1730,
"score": 0,
"subscribers_count": 46
},
@@ -301,10 +301,10 @@
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
"fork": false,
"created_at": "2021-07-01T23:45:58Z",
- "updated_at": "2023-08-18T03:55:51Z",
+ "updated_at": "2023-08-22T04:27:24Z",
"pushed_at": "2021-07-05T08:54:06Z",
- "stargazers_count": 933,
- "watchers_count": 933,
+ "stargazers_count": 934,
+ "watchers_count": 934,
"has_discussions": false,
"forks_count": 228,
"allow_forking": true,
@@ -313,7 +313,7 @@
"topics": [],
"visibility": "public",
"forks": 228,
- "watchers": 933,
+ "watchers": 934,
"score": 0,
"subscribers_count": 26
},
diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json
index 741d435344..3025e89295 100644
--- a/2021/CVE-2021-21972.json
+++ b/2021/CVE-2021-21972.json
@@ -851,12 +851,12 @@
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
- "updated_at": "2023-08-21T09:19:05Z",
+ "updated_at": "2023-08-22T02:39:31Z",
"pushed_at": "2023-05-14T12:08:39Z",
- "stargazers_count": 1050,
- "watchers_count": 1050,
+ "stargazers_count": 1052,
+ "watchers_count": 1052,
"has_discussions": false,
- "forks_count": 131,
+ "forks_count": 132,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -869,8 +869,8 @@
"vcenter"
],
"visibility": "public",
- "forks": 131,
- "watchers": 1050,
+ "forks": 132,
+ "watchers": 1052,
"score": 0,
"subscribers_count": 10
}
diff --git a/2021/CVE-2021-26855.json b/2021/CVE-2021-26855.json
index 383349de3f..09b40292f6 100644
--- a/2021/CVE-2021-26855.json
+++ b/2021/CVE-2021-26855.json
@@ -1130,10 +1130,10 @@
"description": "[ProxyLogon] CVE-2021-26855 & CVE-2021-27065 Fixed RawIdentity Bug Exploit. [ProxyOracle] CVE-2021-31195 & CVE-2021-31196 Exploit Chains. [ProxyShell] CVE-2021-34473 & CVE-2021-34523 & CVE-2021-31207 Exploit Chains.",
"fork": false,
"created_at": "2021-04-14T11:12:30Z",
- "updated_at": "2023-07-18T19:09:06Z",
+ "updated_at": "2023-08-22T04:13:29Z",
"pushed_at": "2022-10-21T08:59:23Z",
- "stargazers_count": 171,
- "watchers_count": 171,
+ "stargazers_count": 172,
+ "watchers_count": 172,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@@ -1142,7 +1142,7 @@
"topics": [],
"visibility": "public",
"forks": 37,
- "watchers": 171,
+ "watchers": 172,
"score": 0,
"subscribers_count": 4
},
diff --git a/2021/CVE-2021-42287.json b/2021/CVE-2021-42287.json
index 38ef65249d..bc63f29f3c 100644
--- a/2021/CVE-2021-42287.json
+++ b/2021/CVE-2021-42287.json
@@ -13,19 +13,19 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
- "updated_at": "2023-08-14T12:33:55Z",
+ "updated_at": "2023-08-22T02:26:31Z",
"pushed_at": "2021-12-16T09:50:15Z",
- "stargazers_count": 1245,
- "watchers_count": 1245,
+ "stargazers_count": 1246,
+ "watchers_count": 1246,
"has_discussions": false,
- "forks_count": 317,
+ "forks_count": 318,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 317,
- "watchers": 1245,
+ "forks": 318,
+ "watchers": 1246,
"score": 0,
"subscribers_count": 27
},
diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json
index 88f815ddc3..9c6c4184ec 100644
--- a/2021/CVE-2021-44228.json
+++ b/2021/CVE-2021-44228.json
@@ -10275,10 +10275,10 @@
"description": "A tool for detect&exploit vmware product log4j(cve-2021-44228) vulnerability.Support VMware HCX\/vCenter\/NSX\/Horizon\/vRealize Operations Manager",
"fork": false,
"created_at": "2021-12-28T01:37:20Z",
- "updated_at": "2023-08-20T08:26:45Z",
+ "updated_at": "2023-08-22T03:13:29Z",
"pushed_at": "2022-01-24T05:37:34Z",
- "stargazers_count": 175,
- "watchers_count": 175,
+ "stargazers_count": 176,
+ "watchers_count": 176,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@@ -10292,7 +10292,7 @@
],
"visibility": "public",
"forks": 35,
- "watchers": 175,
+ "watchers": 176,
"score": 0,
"subscribers_count": 4
},
diff --git a/2022/CVE-2022-20421.json b/2022/CVE-2022-20421.json
index fe6f543cb2..8066799ae4 100644
--- a/2022/CVE-2022-20421.json
+++ b/2022/CVE-2022-20421.json
@@ -13,10 +13,10 @@
"description": "Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)",
"fork": false,
"created_at": "2023-03-23T10:25:59Z",
- "updated_at": "2023-08-19T22:23:34Z",
+ "updated_at": "2023-08-22T03:23:51Z",
"pushed_at": "2023-05-27T15:39:41Z",
- "stargazers_count": 187,
- "watchers_count": 187,
+ "stargazers_count": 188,
+ "watchers_count": 188,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 25,
- "watchers": 187,
+ "watchers": 188,
"score": 0,
"subscribers_count": 6
}
diff --git a/2022/CVE-2022-22947.json b/2022/CVE-2022-22947.json
index 0a18face4f..4059c526b6 100644
--- a/2022/CVE-2022-22947.json
+++ b/2022/CVE-2022-22947.json
@@ -269,38 +269,6 @@
"score": 0,
"subscribers_count": 1
},
- {
- "id": 465998049,
- "name": "CVE-2022-22947-goby",
- "full_name": "york-cmd\/CVE-2022-22947-goby",
- "owner": {
- "login": "york-cmd",
- "id": 64241747,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64241747?v=4",
- "html_url": "https:\/\/github.com\/york-cmd"
- },
- "html_url": "https:\/\/github.com\/york-cmd\/CVE-2022-22947-goby",
- "description": "日常更新一些顺手写的gobypoc,包含高危害EXP",
- "fork": false,
- "created_at": "2022-03-04T05:45:05Z",
- "updated_at": "2022-03-30T14:19:37Z",
- "pushed_at": "2022-03-04T05:47:14Z",
- "stargazers_count": 3,
- "watchers_count": 3,
- "has_discussions": false,
- "forks_count": 1,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [
- "golang"
- ],
- "visibility": "public",
- "forks": 1,
- "watchers": 3,
- "score": 0,
- "subscribers_count": 1
- },
{
"id": 466011549,
"name": "CVE-2022-22947-Spring-Cloud-Gateway",
@@ -361,6 +329,36 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 466061651,
+ "name": "CVE-2022-22947-goby",
+ "full_name": "flying0er\/CVE-2022-22947-goby",
+ "owner": {
+ "login": "flying0er",
+ "id": 16277259,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16277259?v=4",
+ "html_url": "https:\/\/github.com\/flying0er"
+ },
+ "html_url": "https:\/\/github.com\/flying0er\/CVE-2022-22947-goby",
+ "description": "日常更新一些顺手写的gobypoc,包含高危害EXP",
+ "fork": false,
+ "created_at": "2022-03-04T09:29:45Z",
+ "updated_at": "2022-03-04T09:29:42Z",
+ "pushed_at": "2022-03-04T05:47:14Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
{
"id": 466067213,
"name": "CVE-2022-22947",
diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json
index e594db3b7b..f6dd0681f1 100644
--- a/2022/CVE-2022-22954.json
+++ b/2022/CVE-2022-22954.json
@@ -766,12 +766,12 @@
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
- "updated_at": "2023-08-21T09:19:05Z",
+ "updated_at": "2023-08-22T02:39:31Z",
"pushed_at": "2023-05-14T12:08:39Z",
- "stargazers_count": 1050,
- "watchers_count": 1050,
+ "stargazers_count": 1052,
+ "watchers_count": 1052,
"has_discussions": false,
- "forks_count": 131,
+ "forks_count": 132,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -784,8 +784,8 @@
"vcenter"
],
"visibility": "public",
- "forks": 131,
- "watchers": 1050,
+ "forks": 132,
+ "watchers": 1052,
"score": 0,
"subscribers_count": 10
},
diff --git a/2022/CVE-2022-26133.json b/2022/CVE-2022-26133.json
index bd7dc770ef..7706e628ed 100644
--- a/2022/CVE-2022-26133.json
+++ b/2022/CVE-2022-26133.json
@@ -13,10 +13,10 @@
"description": "Atlassian Bitbucket Data Center RCE(CVE-2022-26133) verification.",
"fork": false,
"created_at": "2022-05-09T12:07:51Z",
- "updated_at": "2023-08-07T21:10:26Z",
+ "updated_at": "2023-08-22T01:27:46Z",
"pushed_at": "2022-05-11T02:02:59Z",
- "stargazers_count": 147,
- "watchers_count": 147,
+ "stargazers_count": 148,
+ "watchers_count": 148,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 36,
- "watchers": 147,
+ "watchers": 148,
"score": 0,
"subscribers_count": 2
},
diff --git a/2022/CVE-2022-37969.json b/2022/CVE-2022-37969.json
index cd73bd8d37..f826632ad3 100644
--- a/2022/CVE-2022-37969.json
+++ b/2022/CVE-2022-37969.json
@@ -18,13 +18,13 @@
"stargazers_count": 107,
"watchers_count": 107,
"has_discussions": false,
- "forks_count": 29,
+ "forks_count": 30,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 29,
+ "forks": 30,
"watchers": 107,
"score": 0,
"subscribers_count": 4
diff --git a/2022/CVE-2022-38694.json b/2022/CVE-2022-38694.json
index f21517f6ac..3bc312402f 100644
--- a/2022/CVE-2022-38694.json
+++ b/2022/CVE-2022-38694.json
@@ -10,10 +10,10 @@
"html_url": "https:\/\/github.com\/TomKing062"
},
"html_url": "https:\/\/github.com\/TomKing062\/CVE-2022-38694_unlock_bootloader",
- "description": "execute any binary with BootROM privileges, which can be used to unlock bootloader",
+ "description": "User can execute unsigned binaries with BootROM privileges, which can be used to unlock bootloader",
"fork": false,
"created_at": "2023-06-10T08:31:26Z",
- "updated_at": "2023-08-20T16:53:52Z",
+ "updated_at": "2023-08-22T06:08:09Z",
"pushed_at": "2023-08-18T08:00:37Z",
"stargazers_count": 54,
"watchers_count": 54,
diff --git a/2022/CVE-2022-39197.json b/2022/CVE-2022-39197.json
index 8de5f55d5a..83d88f6ce8 100644
--- a/2022/CVE-2022-39197.json
+++ b/2022/CVE-2022-39197.json
@@ -321,10 +321,10 @@
"description": "CobaltStrike <= 4.7.1 RCE",
"fork": false,
"created_at": "2022-10-14T11:46:01Z",
- "updated_at": "2023-08-20T00:05:56Z",
+ "updated_at": "2023-08-22T05:10:05Z",
"pushed_at": "2022-10-25T05:32:54Z",
- "stargazers_count": 349,
- "watchers_count": 349,
+ "stargazers_count": 350,
+ "watchers_count": 350,
"has_discussions": false,
"forks_count": 83,
"allow_forking": true,
@@ -333,7 +333,7 @@
"topics": [],
"visibility": "public",
"forks": 83,
- "watchers": 349,
+ "watchers": 350,
"score": 0,
"subscribers_count": 7
},
diff --git a/2023/CVE-2023-0386.json b/2023/CVE-2023-0386.json
index bf45a5a0b1..52ff2c5d3f 100644
--- a/2023/CVE-2023-0386.json
+++ b/2023/CVE-2023-0386.json
@@ -78,13 +78,13 @@
"stargazers_count": 352,
"watchers_count": 352,
"has_discussions": false,
- "forks_count": 61,
+ "forks_count": 62,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 61,
+ "forks": 62,
"watchers": 352,
"score": 0,
"subscribers_count": 4
diff --git a/2023/CVE-2023-2023.json b/2023/CVE-2023-2023.json
index 09fc2b894a..f757223d62 100644
--- a/2023/CVE-2023-2023.json
+++ b/2023/CVE-2023-2023.json
@@ -13,10 +13,10 @@
"description": "CVE-2023-2023",
"fork": false,
"created_at": "2021-11-22T12:57:22Z",
- "updated_at": "2023-08-20T06:40:58Z",
+ "updated_at": "2023-08-22T05:43:57Z",
"pushed_at": "2023-07-25T02:38:31Z",
- "stargazers_count": 437,
- "watchers_count": 437,
+ "stargazers_count": 439,
+ "watchers_count": 439,
"has_discussions": false,
"forks_count": 169,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 169,
- "watchers": 437,
+ "watchers": 439,
"score": 0,
"subscribers_count": 16
},
@@ -43,10 +43,10 @@
"description": "HW2023@POC@EXP@CVE-2023-2023",
"fork": false,
"created_at": "2023-08-13T05:54:17Z",
- "updated_at": "2023-08-21T07:35:45Z",
+ "updated_at": "2023-08-22T05:00:51Z",
"pushed_at": "2023-08-16T08:17:30Z",
- "stargazers_count": 10,
- "watchers_count": 10,
+ "stargazers_count": 11,
+ "watchers_count": 11,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
- "watchers": 10,
+ "watchers": 11,
"score": 0,
"subscribers_count": 0
}
diff --git a/2023/CVE-2023-20562.json b/2023/CVE-2023-20562.json
index 446e910537..fab65fb707 100644
--- a/2023/CVE-2023-20562.json
+++ b/2023/CVE-2023-20562.json
@@ -13,21 +13,21 @@
"description": null,
"fork": false,
"created_at": "2023-08-21T00:31:50Z",
- "updated_at": "2023-08-21T20:29:55Z",
+ "updated_at": "2023-08-22T06:01:30Z",
"pushed_at": "2023-08-21T00:33:08Z",
- "stargazers_count": 20,
- "watchers_count": 20,
+ "stargazers_count": 28,
+ "watchers_count": 28,
"has_discussions": false,
- "forks_count": 2,
+ "forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 2,
- "watchers": 20,
+ "forks": 4,
+ "watchers": 28,
"score": 0,
- "subscribers_count": 0
+ "subscribers_count": 1
},
{
"id": 681042384,
@@ -43,10 +43,10 @@
"description": null,
"fork": false,
"created_at": "2023-08-21T06:25:09Z",
- "updated_at": "2023-08-21T15:20:24Z",
+ "updated_at": "2023-08-22T00:59:28Z",
"pushed_at": "2023-08-21T06:25:26Z",
- "stargazers_count": 1,
- "watchers_count": 1,
+ "stargazers_count": 2,
+ "watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@@ -55,8 +55,8 @@
"topics": [],
"visibility": "public",
"forks": 2,
- "watchers": 1,
+ "watchers": 2,
"score": 0,
- "subscribers_count": 0
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2023/CVE-2023-21554.json b/2023/CVE-2023-21554.json
index b05ad1ad35..85c48bb08c 100644
--- a/2023/CVE-2023-21554.json
+++ b/2023/CVE-2023-21554.json
@@ -13,10 +13,10 @@
"description": "CVE-2023-21554 Windows MessageQueuing PoC,分析见 https:\/\/www.zoemurmure.top\/posts\/cve_2023_21554\/",
"fork": false,
"created_at": "2023-05-18T10:30:49Z",
- "updated_at": "2023-08-17T18:07:24Z",
+ "updated_at": "2023-08-22T05:14:59Z",
"pushed_at": "2023-05-18T10:38:57Z",
- "stargazers_count": 42,
- "watchers_count": 42,
+ "stargazers_count": 43,
+ "watchers_count": 43,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
- "watchers": 42,
+ "watchers": 43,
"score": 0,
"subscribers_count": 1
},
@@ -57,6 +57,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
- "subscribers_count": 0
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2023/CVE-2023-21716.json b/2023/CVE-2023-21716.json
index 14a438a020..af055661eb 100644
--- a/2023/CVE-2023-21716.json
+++ b/2023/CVE-2023-21716.json
@@ -43,10 +43,10 @@
"description": "RTF Crash POC Python 3.11 Windows 10",
"fork": false,
"created_at": "2023-03-07T15:03:43Z",
- "updated_at": "2023-07-29T20:18:32Z",
+ "updated_at": "2023-08-22T02:34:05Z",
"pushed_at": "2023-03-07T15:17:47Z",
- "stargazers_count": 41,
- "watchers_count": 41,
+ "stargazers_count": 43,
+ "watchers_count": 43,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
- "watchers": 41,
+ "watchers": 43,
"score": 0,
"subscribers_count": 3
},
diff --git a/2023/CVE-2023-25157.json b/2023/CVE-2023-25157.json
index 5bc7d21ca9..922d6140ff 100644
--- a/2023/CVE-2023-25157.json
+++ b/2023/CVE-2023-25157.json
@@ -13,10 +13,10 @@
"description": "CVE-2023-25157 - GeoServer SQL Injection - PoC",
"fork": false,
"created_at": "2023-06-06T14:05:09Z",
- "updated_at": "2023-08-20T09:06:18Z",
+ "updated_at": "2023-08-22T02:17:40Z",
"pushed_at": "2023-07-14T10:40:17Z",
- "stargazers_count": 121,
- "watchers_count": 121,
+ "stargazers_count": 122,
+ "watchers_count": 122,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 33,
- "watchers": 121,
+ "watchers": 122,
"score": 0,
"subscribers_count": 2
},
diff --git a/2023/CVE-2023-28432.json b/2023/CVE-2023-28432.json
index 82b054ebe7..107e5d2f97 100644
--- a/2023/CVE-2023-28432.json
+++ b/2023/CVE-2023-28432.json
@@ -390,6 +390,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
- "subscribers_count": 0
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2023/CVE-2023-29409.json b/2023/CVE-2023-29409.json
index befd315f27..627275c578 100644
--- a/2023/CVE-2023-29409.json
+++ b/2023/CVE-2023-29409.json
@@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
- "subscribers_count": 0
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2023/CVE-2023-3079.json b/2023/CVE-2023-3079.json
index 85538778ff..46940c1279 100644
--- a/2023/CVE-2023-3079.json
+++ b/2023/CVE-2023-3079.json
@@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-08-15T04:16:46Z",
- "updated_at": "2023-08-21T10:37:03Z",
+ "updated_at": "2023-08-22T03:46:34Z",
"pushed_at": "2023-08-17T11:43:26Z",
- "stargazers_count": 68,
- "watchers_count": 68,
+ "stargazers_count": 67,
+ "watchers_count": 67,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
- "watchers": 68,
+ "watchers": 67,
"score": 0,
"subscribers_count": 2
}
diff --git a/2023/CVE-2023-32233.json b/2023/CVE-2023-32233.json
index 233b86c12f..707e4a6e54 100644
--- a/2023/CVE-2023-32233.json
+++ b/2023/CVE-2023-32233.json
@@ -43,10 +43,10 @@
"description": "CVE-2023-32233: Linux内核中的安全漏洞",
"fork": false,
"created_at": "2023-05-16T03:06:40Z",
- "updated_at": "2023-08-17T02:25:07Z",
+ "updated_at": "2023-08-22T03:45:40Z",
"pushed_at": "2023-05-16T04:34:16Z",
- "stargazers_count": 283,
- "watchers_count": 283,
+ "stargazers_count": 284,
+ "watchers_count": 284,
"has_discussions": false,
"forks_count": 66,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 66,
- "watchers": 283,
+ "watchers": 284,
"score": 0,
"subscribers_count": 4
},
diff --git a/2023/CVE-2023-33157.json b/2023/CVE-2023-33157.json
new file mode 100644
index 0000000000..f0d2282341
--- /dev/null
+++ b/2023/CVE-2023-33157.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 681427359,
+ "name": "CVE-2023-33157",
+ "full_name": "hipnesspatten\/CVE-2023-33157",
+ "owner": {
+ "login": "hipnesspatten",
+ "id": 142857480,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142857480?v=4",
+ "html_url": "https:\/\/github.com\/hipnesspatten"
+ },
+ "html_url": "https:\/\/github.com\/hipnesspatten\/CVE-2023-33157",
+ "description": "POC Microsoft SharePoint Remote Code Execution Vulnerability",
+ "fork": false,
+ "created_at": "2023-08-22T02:01:04Z",
+ "updated_at": "2023-08-22T02:01:25Z",
+ "pushed_at": "2023-08-22T02:01:20Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-33160.json b/2023/CVE-2023-33160.json
new file mode 100644
index 0000000000..587f8d1bc2
--- /dev/null
+++ b/2023/CVE-2023-33160.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 681427098,
+ "name": "CVE-2023-33160",
+ "full_name": "hipnesspatten\/CVE-2023-33160",
+ "owner": {
+ "login": "hipnesspatten",
+ "id": 142857480,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142857480?v=4",
+ "html_url": "https:\/\/github.com\/hipnesspatten"
+ },
+ "html_url": "https:\/\/github.com\/hipnesspatten\/CVE-2023-33160",
+ "description": "POC Microsoft SharePoint Server Remote Code Execution Vulnerability",
+ "fork": false,
+ "created_at": "2023-08-22T02:00:13Z",
+ "updated_at": "2023-08-22T02:00:42Z",
+ "pushed_at": "2023-08-22T02:00:36Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-34312.json b/2023/CVE-2023-34312.json
index 04934b0744..1e585ad66b 100644
--- a/2023/CVE-2023-34312.json
+++ b/2023/CVE-2023-34312.json
@@ -13,10 +13,10 @@
"description": "CVE-2023-34312",
"fork": false,
"created_at": "2023-05-27T12:44:42Z",
- "updated_at": "2023-08-21T12:53:32Z",
+ "updated_at": "2023-08-22T06:38:33Z",
"pushed_at": "2023-05-27T12:45:10Z",
- "stargazers_count": 408,
- "watchers_count": 408,
+ "stargazers_count": 410,
+ "watchers_count": 410,
"has_discussions": false,
"forks_count": 76,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 76,
- "watchers": 408,
+ "watchers": 410,
"score": 0,
"subscribers_count": 3
},
diff --git a/2023/CVE-2023-3519.json b/2023/CVE-2023-3519.json
index 98630d9f12..f8a840684f 100644
--- a/2023/CVE-2023-3519.json
+++ b/2023/CVE-2023-3519.json
@@ -186,7 +186,7 @@
"forks": 24,
"watchers": 163,
"score": 0,
- "subscribers_count": 2
+ "subscribers_count": 3
},
{
"id": 669309594,
@@ -337,5 +337,35 @@
"watchers": 38,
"score": 0,
"subscribers_count": 4
+ },
+ {
+ "id": 681420692,
+ "name": "CVE-2023-3519",
+ "full_name": "knitteruntil0s\/CVE-2023-3519",
+ "owner": {
+ "login": "knitteruntil0s",
+ "id": 142856918,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142856918?v=4",
+ "html_url": "https:\/\/github.com\/knitteruntil0s"
+ },
+ "html_url": "https:\/\/github.com\/knitteruntil0s\/CVE-2023-3519",
+ "description": "POC Citrix vulnerability scanner. Auto Exploit",
+ "fork": false,
+ "created_at": "2023-08-22T01:33:01Z",
+ "updated_at": "2023-08-22T01:36:06Z",
+ "pushed_at": "2023-08-22T01:37:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2023/CVE-2023-36874.json b/2023/CVE-2023-36874.json
index 6ae46f420a..32acf5cfb2 100644
--- a/2023/CVE-2023-36874.json
+++ b/2023/CVE-2023-36874.json
@@ -13,19 +13,19 @@
"description": "CVE-2023-36874 PoC",
"fork": false,
"created_at": "2023-08-20T13:50:42Z",
- "updated_at": "2023-08-21T23:20:53Z",
+ "updated_at": "2023-08-22T06:36:21Z",
"pushed_at": "2023-08-20T13:54:15Z",
- "stargazers_count": 31,
- "watchers_count": 31,
+ "stargazers_count": 45,
+ "watchers_count": 45,
"has_discussions": false,
- "forks_count": 12,
+ "forks_count": 16,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 12,
- "watchers": 31,
+ "forks": 16,
+ "watchers": 45,
"score": 0,
"subscribers_count": 1
},
@@ -57,6 +57,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
- "subscribers_count": 0
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2023/CVE-2023-40477.json b/2023/CVE-2023-40477.json
new file mode 100644
index 0000000000..634ba622d2
--- /dev/null
+++ b/2023/CVE-2023-40477.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 681415136,
+ "name": "CVE-2023-40477",
+ "full_name": "whalersplonk\/CVE-2023-40477",
+ "owner": {
+ "login": "whalersplonk",
+ "id": 142855900,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142855900?v=4",
+ "html_url": "https:\/\/github.com\/whalersplonk"
+ },
+ "html_url": "https:\/\/github.com\/whalersplonk\/CVE-2023-40477",
+ "description": "POC WinRAR vulnerable to remote code execution,",
+ "fork": false,
+ "created_at": "2023-08-22T01:10:53Z",
+ "updated_at": "2023-08-22T05:10:05Z",
+ "pushed_at": "2023-08-22T01:15:49Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-4460.json b/2023/CVE-2023-4460.json
index 4c622e79ed..093be4e229 100644
--- a/2023/CVE-2023-4460.json
+++ b/2023/CVE-2023-4460.json
@@ -29,6 +29,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
- "subscribers_count": 0
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2023/CVE-2023-5546.json b/2023/CVE-2023-5546.json
index 22e8ed6634..bac77f7689 100644
--- a/2023/CVE-2023-5546.json
+++ b/2023/CVE-2023-5546.json
@@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
- "subscribers_count": 0
+ "subscribers_count": 2
}
]
\ No newline at end of file
diff --git a/2023/CVE-2023-9999.json b/2023/CVE-2023-9999.json
index 1aee77d33b..aed450640a 100644
--- a/2023/CVE-2023-9999.json
+++ b/2023/CVE-2023-9999.json
@@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
- "subscribers_count": 0
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/README.md b/README.md
index 2831ff8624..e148a21dfa 100644
--- a/README.md
+++ b/README.md
@@ -465,6 +465,7 @@
- [passwa11/CVE-2023-3519](https://github.com/passwa11/CVE-2023-3519)
- [rwincey/cve-2023-3519](https://github.com/rwincey/cve-2023-3519)
- [mandiant/citrix-ioc-scanner-cve-2023-3519](https://github.com/mandiant/citrix-ioc-scanner-cve-2023-3519)
+- [knitteruntil0s/CVE-2023-3519](https://github.com/knitteruntil0s/CVE-2023-3519)
### CVE-2023-3640 (2023-07-24)
@@ -2027,6 +2028,20 @@
- [LOURC0D3/CVE-2023-32961](https://github.com/LOURC0D3/CVE-2023-32961)
+### CVE-2023-33157 (2023-07-11)
+
+Microsoft SharePoint Remote Code Execution Vulnerability
+
+
+- [hipnesspatten/CVE-2023-33157](https://github.com/hipnesspatten/CVE-2023-33157)
+
+### CVE-2023-33160 (2023-07-11)
+
+Microsoft SharePoint Server Remote Code Execution Vulnerability
+
+
+- [hipnesspatten/CVE-2023-33160](https://github.com/hipnesspatten/CVE-2023-33160)
+
### CVE-2023-33242 (2023-08-09)
Crypto wallets implementing the Lindell17 TSS protocol might allow an attacker to extract the full ECDSA private key by exfiltrating a single bit in every signature attempt (256 in total) because of not adhering to the paper's security proof's assumption regarding handling aborts after a failed signature.
@@ -2834,6 +2849,9 @@
### CVE-2023-40297
- [sahar042/CVE-2023-40297](https://github.com/sahar042/CVE-2023-40297)
+### CVE-2023-40477
+- [whalersplonk/CVE-2023-40477](https://github.com/whalersplonk/CVE-2023-40477)
+
### CVE-2023-51504
- [Sybelle03/CVE-2023-51504](https://github.com/Sybelle03/CVE-2023-51504)
@@ -4414,9 +4432,9 @@
- [Greetdawn/CVE-2022-22947](https://github.com/Greetdawn/CVE-2022-22947)
- [Summer177/Spring-Cloud-Gateway-CVE-2022-22947](https://github.com/Summer177/Spring-Cloud-Gateway-CVE-2022-22947)
- [BerMalBerIst/CVE-2022-22947](https://github.com/BerMalBerIst/CVE-2022-22947)
-- [york-cmd/CVE-2022-22947-goby](https://github.com/york-cmd/CVE-2022-22947-goby)
- [tangxiaofeng7/CVE-2022-22947-Spring-Cloud-Gateway](https://github.com/tangxiaofeng7/CVE-2022-22947-Spring-Cloud-Gateway)
- [dingxiao77/-cve-2022-22947-](https://github.com/dingxiao77/-cve-2022-22947-)
+- [flying0er/CVE-2022-22947-goby](https://github.com/flying0er/CVE-2022-22947-goby)
- [dbgee/CVE-2022-22947](https://github.com/dbgee/CVE-2022-22947)
- [nu0l/cve-2022-22947](https://github.com/nu0l/cve-2022-22947)
- [nanaao/CVE-2022-22947-POC](https://github.com/nanaao/CVE-2022-22947-POC)