From 2086be9f526d907fe38565c5bbf8b94247eb2dda Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Tue, 22 Aug 2023 15:48:11 +0900 Subject: [PATCH] Auto Update 2023/08/22 06:48:11 --- 2010/CVE-2010-1240.json | 8 +++--- 2014/CVE-2014-4210.json | 8 +++--- 2016/CVE-2016-0638.json | 8 +++--- 2017/CVE-2017-3248.json | 8 +++--- 2018/CVE-2018-2628.json | 8 +++--- 2018/CVE-2018-7600.json | 8 +++--- 2018/CVE-2018-9995.json | 8 +++--- 2019/CVE-2019-15107.json | 2 +- 2019/CVE-2019-17558.json | 8 +++--- 2019/CVE-2019-2618.json | 8 +++--- 2020/CVE-2020-14882.json | 8 +++--- 2020/CVE-2020-16938.json | 8 +++--- 2020/CVE-2020-2551.json | 8 +++--- 2020/CVE-2020-2883.json | 8 +++--- 2021/CVE-2021-1675.json | 16 +++++------ 2021/CVE-2021-21972.json | 12 ++++---- 2021/CVE-2021-26855.json | 8 +++--- 2021/CVE-2021-42287.json | 12 ++++---- 2021/CVE-2021-44228.json | 8 +++--- 2022/CVE-2022-20421.json | 8 +++--- 2022/CVE-2022-22947.json | 62 +++++++++++++++++++--------------------- 2022/CVE-2022-22954.json | 12 ++++---- 2022/CVE-2022-26133.json | 8 +++--- 2022/CVE-2022-37969.json | 4 +-- 2022/CVE-2022-38694.json | 4 +-- 2022/CVE-2022-39197.json | 8 +++--- 2023/CVE-2023-0386.json | 4 +-- 2023/CVE-2023-2023.json | 16 +++++------ 2023/CVE-2023-20562.json | 24 ++++++++-------- 2023/CVE-2023-21554.json | 10 +++---- 2023/CVE-2023-21716.json | 8 +++--- 2023/CVE-2023-25157.json | 8 +++--- 2023/CVE-2023-28432.json | 2 +- 2023/CVE-2023-29409.json | 2 +- 2023/CVE-2023-3079.json | 8 +++--- 2023/CVE-2023-32233.json | 8 +++--- 2023/CVE-2023-33157.json | 32 +++++++++++++++++++++ 2023/CVE-2023-33160.json | 32 +++++++++++++++++++++ 2023/CVE-2023-34312.json | 8 +++--- 2023/CVE-2023-3519.json | 32 ++++++++++++++++++++- 2023/CVE-2023-36874.json | 14 ++++----- 2023/CVE-2023-40477.json | 32 +++++++++++++++++++++ 2023/CVE-2023-4460.json | 2 +- 2023/CVE-2023-5546.json | 2 +- 2023/CVE-2023-9999.json | 2 +- README.md | 20 ++++++++++++- 46 files changed, 338 insertions(+), 196 deletions(-) create mode 100644 2023/CVE-2023-33157.json create mode 100644 2023/CVE-2023-33160.json create mode 100644 2023/CVE-2023-40477.json diff --git a/2010/CVE-2010-1240.json b/2010/CVE-2010-1240.json index f35de64a61..562bfa65b5 100644 --- a/2010/CVE-2010-1240.json +++ b/2010/CVE-2010-1240.json @@ -13,10 +13,10 @@ "description": "This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actually consists of embedded payload. The exploit was made public as CVE-2010-1240. ", "fork": false, "created_at": "2021-06-05T18:59:28Z", - "updated_at": "2023-08-17T03:47:42Z", + "updated_at": "2023-08-22T04:18:46Z", "pushed_at": "2021-06-06T09:41:51Z", - "stargazers_count": 23, - "watchers_count": 23, + "stargazers_count": 24, + "watchers_count": 24, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 23, + "watchers": 24, "score": 0, "subscribers_count": 2 }, diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index e864f77f14..859f8be8ec 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -43,10 +43,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-08-21T10:32:48Z", + "updated_at": "2023-08-22T02:00:00Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1771, - "watchers_count": 1771, + "stargazers_count": 1773, + "watchers_count": 1773, "has_discussions": false, "forks_count": 330, "allow_forking": true, @@ -76,7 +76,7 @@ ], "visibility": "public", "forks": 330, - "watchers": 1771, + "watchers": 1773, "score": 0, "subscribers_count": 34 }, diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 57d68030da..c960c71202 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-08-21T10:32:48Z", + "updated_at": "2023-08-22T02:00:00Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1771, - "watchers_count": 1771, + "stargazers_count": 1773, + "watchers_count": 1773, "has_discussions": false, "forks_count": 330, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 330, - "watchers": 1771, + "watchers": 1773, "score": 0, "subscribers_count": 34 }, diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 6e040b09bd..04be711554 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -43,10 +43,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-08-21T10:32:48Z", + "updated_at": "2023-08-22T02:00:00Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1771, - "watchers_count": 1771, + "stargazers_count": 1773, + "watchers_count": 1773, "has_discussions": false, "forks_count": 330, "allow_forking": true, @@ -76,7 +76,7 @@ ], "visibility": "public", "forks": 330, - "watchers": 1771, + "watchers": 1773, "score": 0, "subscribers_count": 34 }, diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 19974ab842..5736eaf3c9 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -587,10 +587,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-08-21T10:32:48Z", + "updated_at": "2023-08-22T02:00:00Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1771, - "watchers_count": 1771, + "stargazers_count": 1773, + "watchers_count": 1773, "has_discussions": false, "forks_count": 330, "allow_forking": true, @@ -620,7 +620,7 @@ ], "visibility": "public", "forks": 330, - "watchers": 1771, + "watchers": 1773, "score": 0, "subscribers_count": 34 }, diff --git a/2018/CVE-2018-7600.json b/2018/CVE-2018-7600.json index 73cecf5a7e..fe0e01a03d 100644 --- a/2018/CVE-2018-7600.json +++ b/2018/CVE-2018-7600.json @@ -363,10 +363,10 @@ "description": "Exploit for Drupal 7 <= 7.57 CVE-2018-7600", "fork": false, "created_at": "2018-04-17T15:38:15Z", - "updated_at": "2023-08-20T11:49:07Z", + "updated_at": "2023-08-22T05:28:46Z", "pushed_at": "2018-04-26T15:40:28Z", - "stargazers_count": 109, - "watchers_count": 109, + "stargazers_count": 110, + "watchers_count": 110, "has_discussions": false, "forks_count": 65, "allow_forking": true, @@ -375,7 +375,7 @@ "topics": [], "visibility": "public", "forks": 65, - "watchers": 109, + "watchers": 110, "score": 0, "subscribers_count": 5 }, diff --git a/2018/CVE-2018-9995.json b/2018/CVE-2018-9995.json index c576846fcc..e3ad1a54a2 100644 --- a/2018/CVE-2018-9995.json +++ b/2018/CVE-2018-9995.json @@ -613,10 +613,10 @@ "description": "A PoC exploit for CVE-2018-9995 - DVR Authentication Bypass", "fork": false, "created_at": "2023-08-18T19:42:17Z", - "updated_at": "2023-08-18T20:00:32Z", + "updated_at": "2023-08-22T00:24:50Z", "pushed_at": "2023-08-21T18:24:16Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -634,7 +634,7 @@ ], "visibility": "public", "forks": 2, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2019/CVE-2019-15107.json b/2019/CVE-2019-15107.json index ec2772ab94..d92914c550 100644 --- a/2019/CVE-2019-15107.json +++ b/2019/CVE-2019-15107.json @@ -936,7 +936,7 @@ "fork": false, "created_at": "2023-08-19T05:41:39Z", "updated_at": "2023-08-19T05:41:39Z", - "pushed_at": "2023-08-19T09:34:05Z", + "pushed_at": "2023-08-22T05:59:36Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 72037126b2..766284c41e 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -43,10 +43,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2023-08-21T13:04:32Z", + "updated_at": "2023-08-22T05:46:36Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3848, - "watchers_count": 3848, + "stargazers_count": 3849, + "watchers_count": 3849, "has_discussions": false, "forks_count": 1085, "allow_forking": true, @@ -75,7 +75,7 @@ ], "visibility": "public", "forks": 1085, - "watchers": 3848, + "watchers": 3849, "score": 0, "subscribers_count": 155 }, diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 1e90935666..d6416e5c55 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -193,10 +193,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-08-21T10:32:48Z", + "updated_at": "2023-08-22T02:00:00Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1771, - "watchers_count": 1771, + "stargazers_count": 1773, + "watchers_count": 1773, "has_discussions": false, "forks_count": 330, "allow_forking": true, @@ -226,7 +226,7 @@ ], "visibility": "public", "forks": 330, - "watchers": 1771, + "watchers": 1773, "score": 0, "subscribers_count": 34 } diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index ac577d3558..06b31d5221 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,10 +13,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2023-08-21T13:04:32Z", + "updated_at": "2023-08-22T05:46:36Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3848, - "watchers_count": 3848, + "stargazers_count": 3849, + "watchers_count": 3849, "has_discussions": false, "forks_count": 1085, "allow_forking": true, @@ -45,7 +45,7 @@ ], "visibility": "public", "forks": 1085, - "watchers": 3848, + "watchers": 3849, "score": 0, "subscribers_count": 155 }, diff --git a/2020/CVE-2020-16938.json b/2020/CVE-2020-16938.json index 0ab5eba23c..4d7a3b3011 100644 --- a/2020/CVE-2020-16938.json +++ b/2020/CVE-2020-16938.json @@ -13,10 +13,10 @@ "description": "Bypassing NTFS permissions to read any files as unprivileged user.", "fork": false, "created_at": "2020-10-21T15:38:22Z", - "updated_at": "2023-07-11T23:22:56Z", + "updated_at": "2023-08-22T01:51:20Z", "pushed_at": "2020-10-21T15:39:00Z", - "stargazers_count": 184, - "watchers_count": 184, + "stargazers_count": 185, + "watchers_count": 185, "has_discussions": false, "forks_count": 40, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 40, - "watchers": 184, + "watchers": 185, "score": 0, "subscribers_count": 10 } diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 88c66ae86a..78490676a6 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-08-21T10:32:48Z", + "updated_at": "2023-08-22T02:00:00Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1771, - "watchers_count": 1771, + "stargazers_count": 1773, + "watchers_count": 1773, "has_discussions": false, "forks_count": 330, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 330, - "watchers": 1771, + "watchers": 1773, "score": 0, "subscribers_count": 34 }, diff --git a/2020/CVE-2020-2883.json b/2020/CVE-2020-2883.json index 4524cdad7b..ca0fa745ce 100644 --- a/2020/CVE-2020-2883.json +++ b/2020/CVE-2020-2883.json @@ -108,10 +108,10 @@ "description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell", "fork": false, "created_at": "2020-08-19T03:34:06Z", - "updated_at": "2023-08-21T02:01:57Z", + "updated_at": "2023-08-22T01:38:07Z", "pushed_at": "2020-08-25T03:17:32Z", - "stargazers_count": 518, - "watchers_count": 518, + "stargazers_count": 519, + "watchers_count": 519, "has_discussions": false, "forks_count": 65, "allow_forking": true, @@ -120,7 +120,7 @@ "topics": [], "visibility": "public", "forks": 65, - "watchers": 518, + "watchers": 519, "score": 0, "subscribers_count": 9 }, diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index 199d1fe22c..b6708f608f 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -43,10 +43,10 @@ "description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527", "fork": false, "created_at": "2021-06-29T17:24:14Z", - "updated_at": "2023-08-18T20:48:04Z", + "updated_at": "2023-08-22T04:03:12Z", "pushed_at": "2021-07-20T15:28:13Z", - "stargazers_count": 1729, - "watchers_count": 1729, + "stargazers_count": 1730, + "watchers_count": 1730, "has_discussions": false, "forks_count": 589, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 589, - "watchers": 1729, + "watchers": 1730, "score": 0, "subscribers_count": 46 }, @@ -301,10 +301,10 @@ "description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)", "fork": false, "created_at": "2021-07-01T23:45:58Z", - "updated_at": "2023-08-18T03:55:51Z", + "updated_at": "2023-08-22T04:27:24Z", "pushed_at": "2021-07-05T08:54:06Z", - "stargazers_count": 933, - "watchers_count": 933, + "stargazers_count": 934, + "watchers_count": 934, "has_discussions": false, "forks_count": 228, "allow_forking": true, @@ -313,7 +313,7 @@ "topics": [], "visibility": "public", "forks": 228, - "watchers": 933, + "watchers": 934, "score": 0, "subscribers_count": 26 }, diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index 741d435344..3025e89295 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -851,12 +851,12 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2023-08-21T09:19:05Z", + "updated_at": "2023-08-22T02:39:31Z", "pushed_at": "2023-05-14T12:08:39Z", - "stargazers_count": 1050, - "watchers_count": 1050, + "stargazers_count": 1052, + "watchers_count": 1052, "has_discussions": false, - "forks_count": 131, + "forks_count": 132, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -869,8 +869,8 @@ "vcenter" ], "visibility": "public", - "forks": 131, - "watchers": 1050, + "forks": 132, + "watchers": 1052, "score": 0, "subscribers_count": 10 } diff --git a/2021/CVE-2021-26855.json b/2021/CVE-2021-26855.json index 383349de3f..09b40292f6 100644 --- a/2021/CVE-2021-26855.json +++ b/2021/CVE-2021-26855.json @@ -1130,10 +1130,10 @@ "description": "[ProxyLogon] CVE-2021-26855 & CVE-2021-27065 Fixed RawIdentity Bug Exploit. [ProxyOracle] CVE-2021-31195 & CVE-2021-31196 Exploit Chains. [ProxyShell] CVE-2021-34473 & CVE-2021-34523 & CVE-2021-31207 Exploit Chains.", "fork": false, "created_at": "2021-04-14T11:12:30Z", - "updated_at": "2023-07-18T19:09:06Z", + "updated_at": "2023-08-22T04:13:29Z", "pushed_at": "2022-10-21T08:59:23Z", - "stargazers_count": 171, - "watchers_count": 171, + "stargazers_count": 172, + "watchers_count": 172, "has_discussions": false, "forks_count": 37, "allow_forking": true, @@ -1142,7 +1142,7 @@ "topics": [], "visibility": "public", "forks": 37, - "watchers": 171, + "watchers": 172, "score": 0, "subscribers_count": 4 }, diff --git a/2021/CVE-2021-42287.json b/2021/CVE-2021-42287.json index 38ef65249d..bc63f29f3c 100644 --- a/2021/CVE-2021-42287.json +++ b/2021/CVE-2021-42287.json @@ -13,19 +13,19 @@ "description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.", "fork": false, "created_at": "2021-12-11T19:27:30Z", - "updated_at": "2023-08-14T12:33:55Z", + "updated_at": "2023-08-22T02:26:31Z", "pushed_at": "2021-12-16T09:50:15Z", - "stargazers_count": 1245, - "watchers_count": 1245, + "stargazers_count": 1246, + "watchers_count": 1246, "has_discussions": false, - "forks_count": 317, + "forks_count": 318, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 317, - "watchers": 1245, + "forks": 318, + "watchers": 1246, "score": 0, "subscribers_count": 27 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 88f815ddc3..9c6c4184ec 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -10275,10 +10275,10 @@ "description": "A tool for detect&exploit vmware product log4j(cve-2021-44228) vulnerability.Support VMware HCX\/vCenter\/NSX\/Horizon\/vRealize Operations Manager", "fork": false, "created_at": "2021-12-28T01:37:20Z", - "updated_at": "2023-08-20T08:26:45Z", + "updated_at": "2023-08-22T03:13:29Z", "pushed_at": "2022-01-24T05:37:34Z", - "stargazers_count": 175, - "watchers_count": 175, + "stargazers_count": 176, + "watchers_count": 176, "has_discussions": false, "forks_count": 35, "allow_forking": true, @@ -10292,7 +10292,7 @@ ], "visibility": "public", "forks": 35, - "watchers": 175, + "watchers": 176, "score": 0, "subscribers_count": 4 }, diff --git a/2022/CVE-2022-20421.json b/2022/CVE-2022-20421.json index fe6f543cb2..8066799ae4 100644 --- a/2022/CVE-2022-20421.json +++ b/2022/CVE-2022-20421.json @@ -13,10 +13,10 @@ "description": "Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)", "fork": false, "created_at": "2023-03-23T10:25:59Z", - "updated_at": "2023-08-19T22:23:34Z", + "updated_at": "2023-08-22T03:23:51Z", "pushed_at": "2023-05-27T15:39:41Z", - "stargazers_count": 187, - "watchers_count": 187, + "stargazers_count": 188, + "watchers_count": 188, "has_discussions": false, "forks_count": 25, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 25, - "watchers": 187, + "watchers": 188, "score": 0, "subscribers_count": 6 } diff --git a/2022/CVE-2022-22947.json b/2022/CVE-2022-22947.json index 0a18face4f..4059c526b6 100644 --- a/2022/CVE-2022-22947.json +++ b/2022/CVE-2022-22947.json @@ -269,38 +269,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 465998049, - "name": "CVE-2022-22947-goby", - "full_name": "york-cmd\/CVE-2022-22947-goby", - "owner": { - "login": "york-cmd", - "id": 64241747, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64241747?v=4", - "html_url": "https:\/\/github.com\/york-cmd" - }, - "html_url": "https:\/\/github.com\/york-cmd\/CVE-2022-22947-goby", - "description": "日常更新一些顺手写的gobypoc,包含高危害EXP", - "fork": false, - "created_at": "2022-03-04T05:45:05Z", - "updated_at": "2022-03-30T14:19:37Z", - "pushed_at": "2022-03-04T05:47:14Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "golang" - ], - "visibility": "public", - "forks": 1, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - }, { "id": 466011549, "name": "CVE-2022-22947-Spring-Cloud-Gateway", @@ -361,6 +329,36 @@ "score": 0, "subscribers_count": 1 }, + { + "id": 466061651, + "name": "CVE-2022-22947-goby", + "full_name": "flying0er\/CVE-2022-22947-goby", + "owner": { + "login": "flying0er", + "id": 16277259, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16277259?v=4", + "html_url": "https:\/\/github.com\/flying0er" + }, + "html_url": "https:\/\/github.com\/flying0er\/CVE-2022-22947-goby", + "description": "日常更新一些顺手写的gobypoc,包含高危害EXP", + "fork": false, + "created_at": "2022-03-04T09:29:45Z", + "updated_at": "2022-03-04T09:29:42Z", + "pushed_at": "2022-03-04T05:47:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + }, { "id": 466067213, "name": "CVE-2022-22947", diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json index e594db3b7b..f6dd0681f1 100644 --- a/2022/CVE-2022-22954.json +++ b/2022/CVE-2022-22954.json @@ -766,12 +766,12 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2023-08-21T09:19:05Z", + "updated_at": "2023-08-22T02:39:31Z", "pushed_at": "2023-05-14T12:08:39Z", - "stargazers_count": 1050, - "watchers_count": 1050, + "stargazers_count": 1052, + "watchers_count": 1052, "has_discussions": false, - "forks_count": 131, + "forks_count": 132, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -784,8 +784,8 @@ "vcenter" ], "visibility": "public", - "forks": 131, - "watchers": 1050, + "forks": 132, + "watchers": 1052, "score": 0, "subscribers_count": 10 }, diff --git a/2022/CVE-2022-26133.json b/2022/CVE-2022-26133.json index bd7dc770ef..7706e628ed 100644 --- a/2022/CVE-2022-26133.json +++ b/2022/CVE-2022-26133.json @@ -13,10 +13,10 @@ "description": "Atlassian Bitbucket Data Center RCE(CVE-2022-26133) verification.", "fork": false, "created_at": "2022-05-09T12:07:51Z", - "updated_at": "2023-08-07T21:10:26Z", + "updated_at": "2023-08-22T01:27:46Z", "pushed_at": "2022-05-11T02:02:59Z", - "stargazers_count": 147, - "watchers_count": 147, + "stargazers_count": 148, + "watchers_count": 148, "has_discussions": false, "forks_count": 36, "allow_forking": true, @@ -27,7 +27,7 @@ ], "visibility": "public", "forks": 36, - "watchers": 147, + "watchers": 148, "score": 0, "subscribers_count": 2 }, diff --git a/2022/CVE-2022-37969.json b/2022/CVE-2022-37969.json index cd73bd8d37..f826632ad3 100644 --- a/2022/CVE-2022-37969.json +++ b/2022/CVE-2022-37969.json @@ -18,13 +18,13 @@ "stargazers_count": 107, "watchers_count": 107, "has_discussions": false, - "forks_count": 29, + "forks_count": 30, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 29, + "forks": 30, "watchers": 107, "score": 0, "subscribers_count": 4 diff --git a/2022/CVE-2022-38694.json b/2022/CVE-2022-38694.json index f21517f6ac..3bc312402f 100644 --- a/2022/CVE-2022-38694.json +++ b/2022/CVE-2022-38694.json @@ -10,10 +10,10 @@ "html_url": "https:\/\/github.com\/TomKing062" }, "html_url": "https:\/\/github.com\/TomKing062\/CVE-2022-38694_unlock_bootloader", - "description": "execute any binary with BootROM privileges, which can be used to unlock bootloader", + "description": "User can execute unsigned binaries with BootROM privileges, which can be used to unlock bootloader", "fork": false, "created_at": "2023-06-10T08:31:26Z", - "updated_at": "2023-08-20T16:53:52Z", + "updated_at": "2023-08-22T06:08:09Z", "pushed_at": "2023-08-18T08:00:37Z", "stargazers_count": 54, "watchers_count": 54, diff --git a/2022/CVE-2022-39197.json b/2022/CVE-2022-39197.json index 8de5f55d5a..83d88f6ce8 100644 --- a/2022/CVE-2022-39197.json +++ b/2022/CVE-2022-39197.json @@ -321,10 +321,10 @@ "description": "CobaltStrike <= 4.7.1 RCE", "fork": false, "created_at": "2022-10-14T11:46:01Z", - "updated_at": "2023-08-20T00:05:56Z", + "updated_at": "2023-08-22T05:10:05Z", "pushed_at": "2022-10-25T05:32:54Z", - "stargazers_count": 349, - "watchers_count": 349, + "stargazers_count": 350, + "watchers_count": 350, "has_discussions": false, "forks_count": 83, "allow_forking": true, @@ -333,7 +333,7 @@ "topics": [], "visibility": "public", "forks": 83, - "watchers": 349, + "watchers": 350, "score": 0, "subscribers_count": 7 }, diff --git a/2023/CVE-2023-0386.json b/2023/CVE-2023-0386.json index bf45a5a0b1..52ff2c5d3f 100644 --- a/2023/CVE-2023-0386.json +++ b/2023/CVE-2023-0386.json @@ -78,13 +78,13 @@ "stargazers_count": 352, "watchers_count": 352, "has_discussions": false, - "forks_count": 61, + "forks_count": 62, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 61, + "forks": 62, "watchers": 352, "score": 0, "subscribers_count": 4 diff --git a/2023/CVE-2023-2023.json b/2023/CVE-2023-2023.json index 09fc2b894a..f757223d62 100644 --- a/2023/CVE-2023-2023.json +++ b/2023/CVE-2023-2023.json @@ -13,10 +13,10 @@ "description": "CVE-2023-2023", "fork": false, "created_at": "2021-11-22T12:57:22Z", - "updated_at": "2023-08-20T06:40:58Z", + "updated_at": "2023-08-22T05:43:57Z", "pushed_at": "2023-07-25T02:38:31Z", - "stargazers_count": 437, - "watchers_count": 437, + "stargazers_count": 439, + "watchers_count": 439, "has_discussions": false, "forks_count": 169, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 169, - "watchers": 437, + "watchers": 439, "score": 0, "subscribers_count": 16 }, @@ -43,10 +43,10 @@ "description": "HW2023@POC@EXP@CVE-2023-2023", "fork": false, "created_at": "2023-08-13T05:54:17Z", - "updated_at": "2023-08-21T07:35:45Z", + "updated_at": "2023-08-22T05:00:51Z", "pushed_at": "2023-08-16T08:17:30Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 11, + "watchers_count": 11, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 10, + "watchers": 11, "score": 0, "subscribers_count": 0 } diff --git a/2023/CVE-2023-20562.json b/2023/CVE-2023-20562.json index 446e910537..fab65fb707 100644 --- a/2023/CVE-2023-20562.json +++ b/2023/CVE-2023-20562.json @@ -13,21 +13,21 @@ "description": null, "fork": false, "created_at": "2023-08-21T00:31:50Z", - "updated_at": "2023-08-21T20:29:55Z", + "updated_at": "2023-08-22T06:01:30Z", "pushed_at": "2023-08-21T00:33:08Z", - "stargazers_count": 20, - "watchers_count": 20, + "stargazers_count": 28, + "watchers_count": 28, "has_discussions": false, - "forks_count": 2, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 2, - "watchers": 20, + "forks": 4, + "watchers": 28, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 }, { "id": 681042384, @@ -43,10 +43,10 @@ "description": null, "fork": false, "created_at": "2023-08-21T06:25:09Z", - "updated_at": "2023-08-21T15:20:24Z", + "updated_at": "2023-08-22T00:59:28Z", "pushed_at": "2023-08-21T06:25:26Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -55,8 +55,8 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 1, + "watchers": 2, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-21554.json b/2023/CVE-2023-21554.json index b05ad1ad35..85c48bb08c 100644 --- a/2023/CVE-2023-21554.json +++ b/2023/CVE-2023-21554.json @@ -13,10 +13,10 @@ "description": "CVE-2023-21554 Windows MessageQueuing PoC,分析见 https:\/\/www.zoemurmure.top\/posts\/cve_2023_21554\/", "fork": false, "created_at": "2023-05-18T10:30:49Z", - "updated_at": "2023-08-17T18:07:24Z", + "updated_at": "2023-08-22T05:14:59Z", "pushed_at": "2023-05-18T10:38:57Z", - "stargazers_count": 42, - "watchers_count": 42, + "stargazers_count": 43, + "watchers_count": 43, "has_discussions": false, "forks_count": 12, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 12, - "watchers": 42, + "watchers": 43, "score": 0, "subscribers_count": 1 }, @@ -57,6 +57,6 @@ "forks": 0, "watchers": 1, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-21716.json b/2023/CVE-2023-21716.json index 14a438a020..af055661eb 100644 --- a/2023/CVE-2023-21716.json +++ b/2023/CVE-2023-21716.json @@ -43,10 +43,10 @@ "description": "RTF Crash POC Python 3.11 Windows 10", "fork": false, "created_at": "2023-03-07T15:03:43Z", - "updated_at": "2023-07-29T20:18:32Z", + "updated_at": "2023-08-22T02:34:05Z", "pushed_at": "2023-03-07T15:17:47Z", - "stargazers_count": 41, - "watchers_count": 41, + "stargazers_count": 43, + "watchers_count": 43, "has_discussions": false, "forks_count": 13, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 13, - "watchers": 41, + "watchers": 43, "score": 0, "subscribers_count": 3 }, diff --git a/2023/CVE-2023-25157.json b/2023/CVE-2023-25157.json index 5bc7d21ca9..922d6140ff 100644 --- a/2023/CVE-2023-25157.json +++ b/2023/CVE-2023-25157.json @@ -13,10 +13,10 @@ "description": "CVE-2023-25157 - GeoServer SQL Injection - PoC", "fork": false, "created_at": "2023-06-06T14:05:09Z", - "updated_at": "2023-08-20T09:06:18Z", + "updated_at": "2023-08-22T02:17:40Z", "pushed_at": "2023-07-14T10:40:17Z", - "stargazers_count": 121, - "watchers_count": 121, + "stargazers_count": 122, + "watchers_count": 122, "has_discussions": false, "forks_count": 33, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 33, - "watchers": 121, + "watchers": 122, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-28432.json b/2023/CVE-2023-28432.json index 82b054ebe7..107e5d2f97 100644 --- a/2023/CVE-2023-28432.json +++ b/2023/CVE-2023-28432.json @@ -390,6 +390,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-29409.json b/2023/CVE-2023-29409.json index befd315f27..627275c578 100644 --- a/2023/CVE-2023-29409.json +++ b/2023/CVE-2023-29409.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-3079.json b/2023/CVE-2023-3079.json index 85538778ff..46940c1279 100644 --- a/2023/CVE-2023-3079.json +++ b/2023/CVE-2023-3079.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2023-08-15T04:16:46Z", - "updated_at": "2023-08-21T10:37:03Z", + "updated_at": "2023-08-22T03:46:34Z", "pushed_at": "2023-08-17T11:43:26Z", - "stargazers_count": 68, - "watchers_count": 68, + "stargazers_count": 67, + "watchers_count": 67, "has_discussions": false, "forks_count": 17, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 17, - "watchers": 68, + "watchers": 67, "score": 0, "subscribers_count": 2 } diff --git a/2023/CVE-2023-32233.json b/2023/CVE-2023-32233.json index 233b86c12f..707e4a6e54 100644 --- a/2023/CVE-2023-32233.json +++ b/2023/CVE-2023-32233.json @@ -43,10 +43,10 @@ "description": "CVE-2023-32233: Linux内核中的安全漏洞", "fork": false, "created_at": "2023-05-16T03:06:40Z", - "updated_at": "2023-08-17T02:25:07Z", + "updated_at": "2023-08-22T03:45:40Z", "pushed_at": "2023-05-16T04:34:16Z", - "stargazers_count": 283, - "watchers_count": 283, + "stargazers_count": 284, + "watchers_count": 284, "has_discussions": false, "forks_count": 66, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 66, - "watchers": 283, + "watchers": 284, "score": 0, "subscribers_count": 4 }, diff --git a/2023/CVE-2023-33157.json b/2023/CVE-2023-33157.json new file mode 100644 index 0000000000..f0d2282341 --- /dev/null +++ b/2023/CVE-2023-33157.json @@ -0,0 +1,32 @@ +[ + { + "id": 681427359, + "name": "CVE-2023-33157", + "full_name": "hipnesspatten\/CVE-2023-33157", + "owner": { + "login": "hipnesspatten", + "id": 142857480, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142857480?v=4", + "html_url": "https:\/\/github.com\/hipnesspatten" + }, + "html_url": "https:\/\/github.com\/hipnesspatten\/CVE-2023-33157", + "description": "POC Microsoft SharePoint Remote Code Execution Vulnerability", + "fork": false, + "created_at": "2023-08-22T02:01:04Z", + "updated_at": "2023-08-22T02:01:25Z", + "pushed_at": "2023-08-22T02:01:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-33160.json b/2023/CVE-2023-33160.json new file mode 100644 index 0000000000..587f8d1bc2 --- /dev/null +++ b/2023/CVE-2023-33160.json @@ -0,0 +1,32 @@ +[ + { + "id": 681427098, + "name": "CVE-2023-33160", + "full_name": "hipnesspatten\/CVE-2023-33160", + "owner": { + "login": "hipnesspatten", + "id": 142857480, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142857480?v=4", + "html_url": "https:\/\/github.com\/hipnesspatten" + }, + "html_url": "https:\/\/github.com\/hipnesspatten\/CVE-2023-33160", + "description": "POC Microsoft SharePoint Server Remote Code Execution Vulnerability", + "fork": false, + "created_at": "2023-08-22T02:00:13Z", + "updated_at": "2023-08-22T02:00:42Z", + "pushed_at": "2023-08-22T02:00:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-34312.json b/2023/CVE-2023-34312.json index 04934b0744..1e585ad66b 100644 --- a/2023/CVE-2023-34312.json +++ b/2023/CVE-2023-34312.json @@ -13,10 +13,10 @@ "description": "CVE-2023-34312", "fork": false, "created_at": "2023-05-27T12:44:42Z", - "updated_at": "2023-08-21T12:53:32Z", + "updated_at": "2023-08-22T06:38:33Z", "pushed_at": "2023-05-27T12:45:10Z", - "stargazers_count": 408, - "watchers_count": 408, + "stargazers_count": 410, + "watchers_count": 410, "has_discussions": false, "forks_count": 76, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 76, - "watchers": 408, + "watchers": 410, "score": 0, "subscribers_count": 3 }, diff --git a/2023/CVE-2023-3519.json b/2023/CVE-2023-3519.json index 98630d9f12..f8a840684f 100644 --- a/2023/CVE-2023-3519.json +++ b/2023/CVE-2023-3519.json @@ -186,7 +186,7 @@ "forks": 24, "watchers": 163, "score": 0, - "subscribers_count": 2 + "subscribers_count": 3 }, { "id": 669309594, @@ -337,5 +337,35 @@ "watchers": 38, "score": 0, "subscribers_count": 4 + }, + { + "id": 681420692, + "name": "CVE-2023-3519", + "full_name": "knitteruntil0s\/CVE-2023-3519", + "owner": { + "login": "knitteruntil0s", + "id": 142856918, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142856918?v=4", + "html_url": "https:\/\/github.com\/knitteruntil0s" + }, + "html_url": "https:\/\/github.com\/knitteruntil0s\/CVE-2023-3519", + "description": "POC Citrix vulnerability scanner. Auto Exploit", + "fork": false, + "created_at": "2023-08-22T01:33:01Z", + "updated_at": "2023-08-22T01:36:06Z", + "pushed_at": "2023-08-22T01:37:39Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-36874.json b/2023/CVE-2023-36874.json index 6ae46f420a..32acf5cfb2 100644 --- a/2023/CVE-2023-36874.json +++ b/2023/CVE-2023-36874.json @@ -13,19 +13,19 @@ "description": "CVE-2023-36874 PoC", "fork": false, "created_at": "2023-08-20T13:50:42Z", - "updated_at": "2023-08-21T23:20:53Z", + "updated_at": "2023-08-22T06:36:21Z", "pushed_at": "2023-08-20T13:54:15Z", - "stargazers_count": 31, - "watchers_count": 31, + "stargazers_count": 45, + "watchers_count": 45, "has_discussions": false, - "forks_count": 12, + "forks_count": 16, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 12, - "watchers": 31, + "forks": 16, + "watchers": 45, "score": 0, "subscribers_count": 1 }, @@ -57,6 +57,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-40477.json b/2023/CVE-2023-40477.json new file mode 100644 index 0000000000..634ba622d2 --- /dev/null +++ b/2023/CVE-2023-40477.json @@ -0,0 +1,32 @@ +[ + { + "id": 681415136, + "name": "CVE-2023-40477", + "full_name": "whalersplonk\/CVE-2023-40477", + "owner": { + "login": "whalersplonk", + "id": 142855900, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142855900?v=4", + "html_url": "https:\/\/github.com\/whalersplonk" + }, + "html_url": "https:\/\/github.com\/whalersplonk\/CVE-2023-40477", + "description": "POC WinRAR vulnerable to remote code execution,", + "fork": false, + "created_at": "2023-08-22T01:10:53Z", + "updated_at": "2023-08-22T05:10:05Z", + "pushed_at": "2023-08-22T01:15:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-4460.json b/2023/CVE-2023-4460.json index 4c622e79ed..093be4e229 100644 --- a/2023/CVE-2023-4460.json +++ b/2023/CVE-2023-4460.json @@ -29,6 +29,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-5546.json b/2023/CVE-2023-5546.json index 22e8ed6634..bac77f7689 100644 --- a/2023/CVE-2023-5546.json +++ b/2023/CVE-2023-5546.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 2 } ] \ No newline at end of file diff --git a/2023/CVE-2023-9999.json b/2023/CVE-2023-9999.json index 1aee77d33b..aed450640a 100644 --- a/2023/CVE-2023-9999.json +++ b/2023/CVE-2023-9999.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/README.md b/README.md index 2831ff8624..e148a21dfa 100644 --- a/README.md +++ b/README.md @@ -465,6 +465,7 @@ - [passwa11/CVE-2023-3519](https://github.com/passwa11/CVE-2023-3519) - [rwincey/cve-2023-3519](https://github.com/rwincey/cve-2023-3519) - [mandiant/citrix-ioc-scanner-cve-2023-3519](https://github.com/mandiant/citrix-ioc-scanner-cve-2023-3519) +- [knitteruntil0s/CVE-2023-3519](https://github.com/knitteruntil0s/CVE-2023-3519) ### CVE-2023-3640 (2023-07-24) @@ -2027,6 +2028,20 @@ - [LOURC0D3/CVE-2023-32961](https://github.com/LOURC0D3/CVE-2023-32961) +### CVE-2023-33157 (2023-07-11) + +Microsoft SharePoint Remote Code Execution Vulnerability + + +- [hipnesspatten/CVE-2023-33157](https://github.com/hipnesspatten/CVE-2023-33157) + +### CVE-2023-33160 (2023-07-11) + +Microsoft SharePoint Server Remote Code Execution Vulnerability + + +- [hipnesspatten/CVE-2023-33160](https://github.com/hipnesspatten/CVE-2023-33160) + ### CVE-2023-33242 (2023-08-09) Crypto wallets implementing the Lindell17 TSS protocol might allow an attacker to extract the full ECDSA private key by exfiltrating a single bit in every signature attempt (256 in total) because of not adhering to the paper's security proof's assumption regarding handling aborts after a failed signature. @@ -2834,6 +2849,9 @@ ### CVE-2023-40297 - [sahar042/CVE-2023-40297](https://github.com/sahar042/CVE-2023-40297) +### CVE-2023-40477 +- [whalersplonk/CVE-2023-40477](https://github.com/whalersplonk/CVE-2023-40477) + ### CVE-2023-51504 - [Sybelle03/CVE-2023-51504](https://github.com/Sybelle03/CVE-2023-51504) @@ -4414,9 +4432,9 @@ - [Greetdawn/CVE-2022-22947](https://github.com/Greetdawn/CVE-2022-22947) - [Summer177/Spring-Cloud-Gateway-CVE-2022-22947](https://github.com/Summer177/Spring-Cloud-Gateway-CVE-2022-22947) - [BerMalBerIst/CVE-2022-22947](https://github.com/BerMalBerIst/CVE-2022-22947) -- [york-cmd/CVE-2022-22947-goby](https://github.com/york-cmd/CVE-2022-22947-goby) - [tangxiaofeng7/CVE-2022-22947-Spring-Cloud-Gateway](https://github.com/tangxiaofeng7/CVE-2022-22947-Spring-Cloud-Gateway) - [dingxiao77/-cve-2022-22947-](https://github.com/dingxiao77/-cve-2022-22947-) +- [flying0er/CVE-2022-22947-goby](https://github.com/flying0er/CVE-2022-22947-goby) - [dbgee/CVE-2022-22947](https://github.com/dbgee/CVE-2022-22947) - [nu0l/cve-2022-22947](https://github.com/nu0l/cve-2022-22947) - [nanaao/CVE-2022-22947-POC](https://github.com/nanaao/CVE-2022-22947-POC)