diff --git a/2017/CVE-2017-0781.json b/2017/CVE-2017-0781.json
index 7dd6f643e2..eebdb8a707 100644
--- a/2017/CVE-2017-0781.json
+++ b/2017/CVE-2017-0781.json
@@ -49,10 +49,10 @@
"description": "Android Blueborne RCE CVE-2017-0781",
"fork": false,
"created_at": "2018-03-17T21:07:24Z",
- "updated_at": "2024-01-17T16:00:49Z",
+ "updated_at": "2024-02-25T20:04:32Z",
"pushed_at": "2018-04-04T12:59:18Z",
- "stargazers_count": 73,
- "watchers_count": 73,
+ "stargazers_count": 74,
+ "watchers_count": 74,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@@ -61,7 +61,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
- "watchers": 73,
+ "watchers": 74,
"score": 0,
"subscribers_count": 6
},
diff --git a/2017/CVE-2017-11882.json b/2017/CVE-2017-11882.json
index e63b565a53..2677feff4b 100644
--- a/2017/CVE-2017-11882.json
+++ b/2017/CVE-2017-11882.json
@@ -133,10 +133,10 @@
"description": "CVE-2017-11882 Exploit accepts over 17k bytes long command\/code in maximum.",
"fork": false,
"created_at": "2017-11-21T15:22:41Z",
- "updated_at": "2024-01-17T16:00:34Z",
+ "updated_at": "2024-02-25T20:21:12Z",
"pushed_at": "2017-12-06T12:47:31Z",
- "stargazers_count": 316,
- "watchers_count": 316,
+ "stargazers_count": 317,
+ "watchers_count": 317,
"has_discussions": false,
"forks_count": 101,
"allow_forking": true,
@@ -150,7 +150,7 @@
],
"visibility": "public",
"forks": 101,
- "watchers": 316,
+ "watchers": 317,
"score": 0,
"subscribers_count": 18
},
diff --git a/2017/CVE-2017-5123.json b/2017/CVE-2017-5123.json
index 8dcf74d0f8..7fd6ed5ddd 100644
--- a/2017/CVE-2017-5123.json
+++ b/2017/CVE-2017-5123.json
@@ -153,5 +153,35 @@
"watchers": 29,
"score": 0,
"subscribers_count": 2
+ },
+ {
+ "id": 612740053,
+ "name": "CVE-2017-5123",
+ "full_name": "h1bAna\/CVE-2017-5123",
+ "owner": {
+ "login": "h1bAna",
+ "id": 70074237,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70074237?v=4",
+ "html_url": "https:\/\/github.com\/h1bAna"
+ },
+ "html_url": "https:\/\/github.com\/h1bAna\/CVE-2017-5123",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-03-11T20:45:15Z",
+ "updated_at": "2024-02-25T18:57:44Z",
+ "pushed_at": "2023-03-11T20:52:25Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json
index ace779e0ba..d0164ef595 100644
--- a/2019/CVE-2019-17558.json
+++ b/2019/CVE-2019-17558.json
@@ -48,7 +48,7 @@
"stargazers_count": 3988,
"watchers_count": 3988,
"has_discussions": false,
- "forks_count": 1079,
+ "forks_count": 1078,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -74,7 +74,7 @@
"webshell"
],
"visibility": "public",
- "forks": 1079,
+ "forks": 1078,
"watchers": 3988,
"score": 0,
"subscribers_count": 153
diff --git a/2019/CVE-2019-19781.json b/2019/CVE-2019-19781.json
index 10f092a166..1e20002799 100644
--- a/2019/CVE-2019-19781.json
+++ b/2019/CVE-2019-19781.json
@@ -43,10 +43,10 @@
"description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.",
"fork": false,
"created_at": "2020-01-11T00:08:27Z",
- "updated_at": "2024-01-12T01:26:35Z",
+ "updated_at": "2024-02-25T21:00:40Z",
"pushed_at": "2020-01-22T20:23:51Z",
- "stargazers_count": 571,
- "watchers_count": 571,
+ "stargazers_count": 570,
+ "watchers_count": 570,
"has_discussions": false,
"forks_count": 131,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 131,
- "watchers": 571,
+ "watchers": 570,
"score": 0,
"subscribers_count": 29
},
diff --git a/2020/CVE-2020-10189.json b/2020/CVE-2020-10189.json
index b60fc5e518..e36ccca298 100644
--- a/2020/CVE-2020-10189.json
+++ b/2020/CVE-2020-10189.json
@@ -57,6 +57,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
- "subscribers_count": 0
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json
index e02bf733b7..a0ba5f0656 100644
--- a/2020/CVE-2020-14882.json
+++ b/2020/CVE-2020-14882.json
@@ -18,7 +18,7 @@
"stargazers_count": 3988,
"watchers_count": 3988,
"has_discussions": false,
- "forks_count": 1079,
+ "forks_count": 1078,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -44,7 +44,7 @@
"webshell"
],
"visibility": "public",
- "forks": 1079,
+ "forks": 1078,
"watchers": 3988,
"score": 0,
"subscribers_count": 153
diff --git a/2020/CVE-2020-3452.json b/2020/CVE-2020-3452.json
index c5a5bf271d..58b167add1 100644
--- a/2020/CVE-2020-3452.json
+++ b/2020/CVE-2020-3452.json
@@ -652,6 +652,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
- "subscribers_count": 0
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json
index ed9595e57b..cafa8e2a0c 100644
--- a/2021/CVE-2021-3156.json
+++ b/2021/CVE-2021-3156.json
@@ -470,10 +470,10 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
- "updated_at": "2024-02-18T18:33:40Z",
+ "updated_at": "2024-02-25T20:52:21Z",
"pushed_at": "2021-02-02T17:07:09Z",
- "stargazers_count": 908,
- "watchers_count": 908,
+ "stargazers_count": 907,
+ "watchers_count": 907,
"has_discussions": false,
"forks_count": 242,
"allow_forking": true,
@@ -482,7 +482,7 @@
"topics": [],
"visibility": "public",
"forks": 242,
- "watchers": 908,
+ "watchers": 907,
"score": 0,
"subscribers_count": 27
},
@@ -899,13 +899,13 @@
"stargazers_count": 49,
"watchers_count": 49,
"has_discussions": false,
- "forks_count": 16,
+ "forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 16,
+ "forks": 15,
"watchers": 49,
"score": 0,
"subscribers_count": 1
diff --git a/2021/CVE-2021-36260.json b/2021/CVE-2021-36260.json
index 4c713bb25c..a9d64aab4c 100644
--- a/2021/CVE-2021-36260.json
+++ b/2021/CVE-2021-36260.json
@@ -43,10 +43,10 @@
"description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.",
"fork": false,
"created_at": "2021-10-27T15:51:12Z",
- "updated_at": "2024-02-12T00:50:35Z",
+ "updated_at": "2024-02-25T20:45:56Z",
"pushed_at": "2021-10-28T06:37:37Z",
- "stargazers_count": 223,
- "watchers_count": 223,
+ "stargazers_count": 222,
+ "watchers_count": 222,
"has_discussions": false,
"forks_count": 73,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 73,
- "watchers": 223,
+ "watchers": 222,
"score": 0,
"subscribers_count": 5
},
diff --git a/2021/CVE-2021-37580.json b/2021/CVE-2021-37580.json
index 2a134f191a..1138366b57 100644
--- a/2021/CVE-2021-37580.json
+++ b/2021/CVE-2021-37580.json
@@ -43,10 +43,10 @@
"description": "CVE-2021-37580的poc",
"fork": false,
"created_at": "2021-11-17T13:26:46Z",
- "updated_at": "2024-01-17T16:03:41Z",
+ "updated_at": "2024-02-25T20:55:37Z",
"pushed_at": "2023-06-18T01:19:09Z",
- "stargazers_count": 39,
- "watchers_count": 39,
+ "stargazers_count": 38,
+ "watchers_count": 38,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
- "watchers": 39,
+ "watchers": 38,
"score": 0,
"subscribers_count": 1
},
diff --git a/2021/CVE-2021-38647.json b/2021/CVE-2021-38647.json
index 25e6e25eb6..2059821fe9 100644
--- a/2021/CVE-2021-38647.json
+++ b/2021/CVE-2021-38647.json
@@ -228,10 +228,10 @@
"description": "CVE-2021-38647 - POC to exploit unauthenticated RCE #OMIGOD",
"fork": false,
"created_at": "2021-09-20T16:29:48Z",
- "updated_at": "2023-12-25T18:38:51Z",
+ "updated_at": "2024-02-25T23:01:16Z",
"pushed_at": "2021-09-26T04:37:04Z",
- "stargazers_count": 66,
- "watchers_count": 66,
+ "stargazers_count": 67,
+ "watchers_count": 67,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@@ -240,7 +240,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
- "watchers": 66,
+ "watchers": 67,
"score": 0,
"subscribers_count": 5
},
diff --git a/2021/CVE-2021-40449.json b/2021/CVE-2021-40449.json
index 89e99169f7..b4af297080 100644
--- a/2021/CVE-2021-40449.json
+++ b/2021/CVE-2021-40449.json
@@ -13,10 +13,10 @@
"description": "Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2021-10-16T16:17:44Z",
- "updated_at": "2024-02-05T01:18:54Z",
+ "updated_at": "2024-02-25T20:48:14Z",
"pushed_at": "2021-11-11T17:09:56Z",
- "stargazers_count": 456,
- "watchers_count": 456,
+ "stargazers_count": 455,
+ "watchers_count": 455,
"has_discussions": false,
"forks_count": 96,
"allow_forking": true,
@@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 96,
- "watchers": 456,
+ "watchers": 455,
"score": 0,
"subscribers_count": 13
},
diff --git a/2021/CVE-2021-42287.json b/2021/CVE-2021-42287.json
index 1c9a8c3b97..d20942ef3f 100644
--- a/2021/CVE-2021-42287.json
+++ b/2021/CVE-2021-42287.json
@@ -13,7 +13,7 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
- "updated_at": "2024-02-22T23:16:18Z",
+ "updated_at": "2024-02-25T21:07:07Z",
"pushed_at": "2021-12-16T09:50:15Z",
"stargazers_count": 1284,
"watchers_count": 1284,
diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json
index 5d4b374d9a..7ae0512ecc 100644
--- a/2021/CVE-2021-44228.json
+++ b/2021/CVE-2021-44228.json
@@ -369,10 +369,10 @@
"description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
"fork": false,
"created_at": "2021-12-10T12:38:20Z",
- "updated_at": "2024-02-23T19:44:00Z",
+ "updated_at": "2024-02-25T20:55:58Z",
"pushed_at": "2023-05-11T11:29:46Z",
- "stargazers_count": 1081,
- "watchers_count": 1081,
+ "stargazers_count": 1080,
+ "watchers_count": 1080,
"has_discussions": false,
"forks_count": 522,
"allow_forking": true,
@@ -383,7 +383,7 @@
],
"visibility": "public",
"forks": 522,
- "watchers": 1081,
+ "watchers": 1080,
"score": 0,
"subscribers_count": 23
},
diff --git a/2022/CVE-2022-1388.json b/2022/CVE-2022-1388.json
index 6a8d001331..3b97953211 100644
--- a/2022/CVE-2022-1388.json
+++ b/2022/CVE-2022-1388.json
@@ -320,10 +320,10 @@
"description": "F5 BIG-IP RCE exploitation (CVE-2022-1388)",
"fork": false,
"created_at": "2022-05-09T10:34:38Z",
- "updated_at": "2024-01-24T11:19:45Z",
+ "updated_at": "2024-02-25T20:44:22Z",
"pushed_at": "2022-05-16T12:40:51Z",
- "stargazers_count": 90,
- "watchers_count": 90,
+ "stargazers_count": 89,
+ "watchers_count": 89,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@@ -332,7 +332,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
- "watchers": 90,
+ "watchers": 89,
"score": 0,
"subscribers_count": 2
},
diff --git a/2022/CVE-2022-23131.json b/2022/CVE-2022-23131.json
index eb9a66e4dd..0507d9b67d 100644
--- a/2022/CVE-2022-23131.json
+++ b/2022/CVE-2022-23131.json
@@ -103,10 +103,10 @@
"description": null,
"fork": false,
"created_at": "2022-02-18T14:48:53Z",
- "updated_at": "2022-06-01T14:58:14Z",
+ "updated_at": "2024-02-25T20:55:02Z",
"pushed_at": "2022-02-19T03:14:47Z",
- "stargazers_count": 3,
- "watchers_count": 3,
+ "stargazers_count": 2,
+ "watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 3,
+ "watchers": 2,
"score": 0,
"subscribers_count": 1
},
diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json
index 98b37f7c34..2c57fbf496 100644
--- a/2022/CVE-2022-26134.json
+++ b/2022/CVE-2022-26134.json
@@ -13,10 +13,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
- "updated_at": "2024-02-21T02:00:55Z",
+ "updated_at": "2024-02-25T21:59:55Z",
"pushed_at": "2023-02-26T14:06:05Z",
- "stargazers_count": 1097,
- "watchers_count": 1097,
+ "stargazers_count": 1098,
+ "watchers_count": 1098,
"has_discussions": true,
"forks_count": 186,
"allow_forking": true,
@@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 186,
- "watchers": 1097,
+ "watchers": 1098,
"score": 0,
"subscribers_count": 18
},
diff --git a/2022/CVE-2022-26809.json b/2022/CVE-2022-26809.json
index 21a7933425..38445cd6b1 100644
--- a/2022/CVE-2022-26809.json
+++ b/2022/CVE-2022-26809.json
@@ -227,10 +227,10 @@
"description": "PoC for CVE-2022-26809, analisys and considerations are shown in the github.io.",
"fork": false,
"created_at": "2022-06-13T11:08:33Z",
- "updated_at": "2024-01-24T11:20:12Z",
+ "updated_at": "2024-02-25T20:44:39Z",
"pushed_at": "2022-06-18T13:53:53Z",
- "stargazers_count": 109,
- "watchers_count": 109,
+ "stargazers_count": 108,
+ "watchers_count": 108,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@@ -239,7 +239,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
- "watchers": 109,
+ "watchers": 108,
"score": 0,
"subscribers_count": 5
},
diff --git a/2023/CVE-2023-21768.json b/2023/CVE-2023-21768.json
index 80021b57f3..fc1e028d3d 100644
--- a/2023/CVE-2023-21768.json
+++ b/2023/CVE-2023-21768.json
@@ -201,7 +201,7 @@
"description": null,
"fork": false,
"created_at": "2023-04-05T02:05:17Z",
- "updated_at": "2023-10-31T12:09:01Z",
+ "updated_at": "2024-02-25T18:56:42Z",
"pushed_at": "2023-04-05T02:07:22Z",
"stargazers_count": 0,
"watchers_count": 0,
diff --git a/2023/CVE-2023-22515.json b/2023/CVE-2023-22515.json
index fb86c81b2a..7b4cf78d08 100644
--- a/2023/CVE-2023-22515.json
+++ b/2023/CVE-2023-22515.json
@@ -619,10 +619,10 @@
"description": "Passive version detection method for CVE-2023-22515 using Nuclei scanner",
"fork": false,
"created_at": "2024-02-24T16:04:35Z",
- "updated_at": "2024-02-25T08:06:42Z",
+ "updated_at": "2024-02-25T20:18:48Z",
"pushed_at": "2024-02-24T16:12:56Z",
- "stargazers_count": 1,
- "watchers_count": 1,
+ "stargazers_count": 2,
+ "watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -631,7 +631,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 1,
+ "watchers": 2,
"score": 0,
"subscribers_count": 1
}
diff --git a/2023/CVE-2023-23397.json b/2023/CVE-2023-23397.json
index ad24918f1f..e27f447dc3 100644
--- a/2023/CVE-2023-23397.json
+++ b/2023/CVE-2023-23397.json
@@ -13,10 +13,10 @@
"description": "Exploit for the CVE-2023-23397",
"fork": false,
"created_at": "2023-03-15T17:03:38Z",
- "updated_at": "2023-12-23T14:47:45Z",
+ "updated_at": "2024-02-25T20:22:13Z",
"pushed_at": "2023-03-15T17:53:53Z",
- "stargazers_count": 157,
- "watchers_count": 157,
+ "stargazers_count": 158,
+ "watchers_count": 158,
"has_discussions": false,
"forks_count": 46,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 46,
- "watchers": 157,
+ "watchers": 158,
"score": 0,
"subscribers_count": 2
},
diff --git a/2023/CVE-2023-28218.json b/2023/CVE-2023-28218.json
new file mode 100644
index 0000000000..cfdf5a9167
--- /dev/null
+++ b/2023/CVE-2023-28218.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 648327862,
+ "name": "CVE-2023-28218",
+ "full_name": "h1bAna\/CVE-2023-28218",
+ "owner": {
+ "login": "h1bAna",
+ "id": 70074237,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70074237?v=4",
+ "html_url": "https:\/\/github.com\/h1bAna"
+ },
+ "html_url": "https:\/\/github.com\/h1bAna\/CVE-2023-28218",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-06-01T18:04:32Z",
+ "updated_at": "2024-02-25T18:56:02Z",
+ "pushed_at": "2023-06-01T18:10:10Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-3076.json b/2023/CVE-2023-3076.json
index b0f7fb2e4a..2496c21a31 100644
--- a/2023/CVE-2023-3076.json
+++ b/2023/CVE-2023-3076.json
@@ -13,10 +13,10 @@
"description": "Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (Mass Add Admin + PHP File Upload)",
"fork": false,
"created_at": "2023-09-19T04:59:01Z",
- "updated_at": "2024-02-24T11:42:56Z",
+ "updated_at": "2024-02-25T21:07:38Z",
"pushed_at": "2023-09-20T11:41:02Z",
- "stargazers_count": 12,
- "watchers_count": 12,
+ "stargazers_count": 13,
+ "watchers_count": 13,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@@ -36,7 +36,7 @@
],
"visibility": "public",
"forks": 2,
- "watchers": 12,
+ "watchers": 13,
"score": 0,
"subscribers_count": 1
}
diff --git a/2023/CVE-2023-30943.json b/2023/CVE-2023-30943.json
index 0c3890f6fb..13fe9b46e2 100644
--- a/2023/CVE-2023-30943.json
+++ b/2023/CVE-2023-30943.json
@@ -13,10 +13,10 @@
"description": "CVE-2023-30943 RCE PoC",
"fork": false,
"created_at": "2023-08-31T08:18:17Z",
- "updated_at": "2023-11-02T19:29:54Z",
+ "updated_at": "2024-02-26T00:03:58Z",
"pushed_at": "2023-08-31T09:39:18Z",
- "stargazers_count": 14,
- "watchers_count": 14,
+ "stargazers_count": 15,
+ "watchers_count": 15,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 14,
+ "watchers": 15,
"score": 0,
"subscribers_count": 1
},
diff --git a/2023/CVE-2023-34362.json b/2023/CVE-2023-34362.json
index 32b51a908d..9526fc0328 100644
--- a/2023/CVE-2023-34362.json
+++ b/2023/CVE-2023-34362.json
@@ -78,13 +78,13 @@
"stargazers_count": 62,
"watchers_count": 62,
"has_discussions": false,
- "forks_count": 25,
+ "forks_count": 23,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 25,
+ "forks": 23,
"watchers": 62,
"score": 0,
"subscribers_count": 4
diff --git a/2023/CVE-2023-34761.json b/2023/CVE-2023-34761.json
index 248dde32a1..a039ab1784 100644
--- a/2023/CVE-2023-34761.json
+++ b/2023/CVE-2023-34761.json
@@ -10,10 +10,10 @@
"html_url": "https:\/\/github.com\/actuator"
},
"html_url": "https:\/\/github.com\/actuator\/7-Eleven-Bluetooth-Smart-Cup-Jailbreak",
- "description": "'Hacking' a 7-Eleven Bluetooth Smart Cup 🙃 | CVE-2023-34761",
+ "description": "'Hacking' a 7-Eleven Bluetooth Smart Cup | CVE-2023-34761",
"fork": false,
"created_at": "2023-05-04T18:37:39Z",
- "updated_at": "2024-02-06T17:31:56Z",
+ "updated_at": "2024-02-25T23:34:37Z",
"pushed_at": "2023-06-23T00:10:55Z",
"stargazers_count": 20,
"watchers_count": 20,
diff --git a/2023/CVE-2023-38041.json b/2023/CVE-2023-38041.json
index 1870dfcb01..ca94f68cb4 100644
--- a/2023/CVE-2023-38041.json
+++ b/2023/CVE-2023-38041.json
@@ -18,13 +18,13 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
+ "forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
diff --git a/2023/CVE-2023-4911.json b/2023/CVE-2023-4911.json
index b3c6d552c0..3e7d7d4321 100644
--- a/2023/CVE-2023-4911.json
+++ b/2023/CVE-2023-4911.json
@@ -43,10 +43,10 @@
"description": "PoC for CVE-2023-4911",
"fork": false,
"created_at": "2023-10-04T14:12:16Z",
- "updated_at": "2024-02-14T15:46:11Z",
+ "updated_at": "2024-02-25T20:28:07Z",
"pushed_at": "2023-10-04T14:16:36Z",
- "stargazers_count": 370,
- "watchers_count": 370,
+ "stargazers_count": 371,
+ "watchers_count": 371,
"has_discussions": false,
"forks_count": 58,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 58,
- "watchers": 370,
+ "watchers": 371,
"score": 0,
"subscribers_count": 5
},
diff --git a/2023/CVE-2023-50387.json b/2023/CVE-2023-50387.json
index ae9c315f81..c90352b97c 100644
--- a/2023/CVE-2023-50387.json
+++ b/2023/CVE-2023-50387.json
@@ -13,10 +13,10 @@
"description": "KeyTrap (DNSSEC)",
"fork": false,
"created_at": "2024-02-18T21:50:04Z",
- "updated_at": "2024-02-24T22:35:24Z",
+ "updated_at": "2024-02-26T00:19:11Z",
"pushed_at": "2024-02-18T22:15:14Z",
- "stargazers_count": 25,
- "watchers_count": 25,
+ "stargazers_count": 26,
+ "watchers_count": 26,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
- "watchers": 25,
+ "watchers": 26,
"score": 0,
"subscribers_count": 1
}
diff --git a/2023/CVE-2023-50643.json b/2023/CVE-2023-50643.json
index 08f56931bc..a6dee58ddb 100644
--- a/2023/CVE-2023-50643.json
+++ b/2023/CVE-2023-50643.json
@@ -2,14 +2,14 @@
{
"id": 729209972,
"name": "CVE-2023-50643",
- "full_name": "V3x0r\/CVE-2023-50643",
+ "full_name": "giovannipajeu1\/CVE-2023-50643",
"owner": {
- "login": "V3x0r",
+ "login": "giovannipajeu1",
"id": 83291215,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83291215?v=4",
- "html_url": "https:\/\/github.com\/V3x0r"
+ "html_url": "https:\/\/github.com\/giovannipajeu1"
},
- "html_url": "https:\/\/github.com\/V3x0r\/CVE-2023-50643",
+ "html_url": "https:\/\/github.com\/giovannipajeu1\/CVE-2023-50643",
"description": "CVE-2023-50643",
"fork": false,
"created_at": "2023-12-08T16:37:16Z",
diff --git a/2024/CVE-2024-20656.json b/2024/CVE-2024-20656.json
index 727690d957..d0fa867b9d 100644
--- a/2024/CVE-2024-20656.json
+++ b/2024/CVE-2024-20656.json
@@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-01-12T15:08:01Z",
- "updated_at": "2024-02-24T07:10:33Z",
+ "updated_at": "2024-02-25T21:19:41Z",
"pushed_at": "2024-01-14T07:14:33Z",
- "stargazers_count": 106,
- "watchers_count": 106,
+ "stargazers_count": 105,
+ "watchers_count": 105,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
- "watchers": 106,
+ "watchers": 105,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-23738.json b/2024/CVE-2024-23738.json
index 432b2a359f..0153f1745d 100644
--- a/2024/CVE-2024-23738.json
+++ b/2024/CVE-2024-23738.json
@@ -2,14 +2,14 @@
{
"id": 748194668,
"name": "CVE-2024-23738",
- "full_name": "V3x0r\/CVE-2024-23738",
+ "full_name": "giovannipajeu1\/CVE-2024-23738",
"owner": {
- "login": "V3x0r",
+ "login": "giovannipajeu1",
"id": 83291215,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83291215?v=4",
- "html_url": "https:\/\/github.com\/V3x0r"
+ "html_url": "https:\/\/github.com\/giovannipajeu1"
},
- "html_url": "https:\/\/github.com\/V3x0r\/CVE-2024-23738",
+ "html_url": "https:\/\/github.com\/giovannipajeu1\/CVE-2024-23738",
"description": "CVE-2024-23738",
"fork": false,
"created_at": "2024-01-25T13:27:19Z",
diff --git a/2024/CVE-2024-23739.json b/2024/CVE-2024-23739.json
index 0b8a177ae3..cace0173a9 100644
--- a/2024/CVE-2024-23739.json
+++ b/2024/CVE-2024-23739.json
@@ -2,14 +2,14 @@
{
"id": 748201476,
"name": "CVE-2024-23739",
- "full_name": "V3x0r\/CVE-2024-23739",
+ "full_name": "giovannipajeu1\/CVE-2024-23739",
"owner": {
- "login": "V3x0r",
+ "login": "giovannipajeu1",
"id": 83291215,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83291215?v=4",
- "html_url": "https:\/\/github.com\/V3x0r"
+ "html_url": "https:\/\/github.com\/giovannipajeu1"
},
- "html_url": "https:\/\/github.com\/V3x0r\/CVE-2024-23739",
+ "html_url": "https:\/\/github.com\/giovannipajeu1\/CVE-2024-23739",
"description": "CVE-2024-23739",
"fork": false,
"created_at": "2024-01-25T13:44:16Z",
diff --git a/2024/CVE-2024-23740.json b/2024/CVE-2024-23740.json
index d11a01f9aa..bed39e927f 100644
--- a/2024/CVE-2024-23740.json
+++ b/2024/CVE-2024-23740.json
@@ -2,14 +2,14 @@
{
"id": 748198610,
"name": "CVE-2024-23740",
- "full_name": "V3x0r\/CVE-2024-23740",
+ "full_name": "giovannipajeu1\/CVE-2024-23740",
"owner": {
- "login": "V3x0r",
+ "login": "giovannipajeu1",
"id": 83291215,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83291215?v=4",
- "html_url": "https:\/\/github.com\/V3x0r"
+ "html_url": "https:\/\/github.com\/giovannipajeu1"
},
- "html_url": "https:\/\/github.com\/V3x0r\/CVE-2024-23740",
+ "html_url": "https:\/\/github.com\/giovannipajeu1\/CVE-2024-23740",
"description": " CVE-2024-23739",
"fork": false,
"created_at": "2024-01-25T13:37:08Z",
diff --git a/2024/CVE-2024-23741.json b/2024/CVE-2024-23741.json
index 706d20dd0b..973cf498b6 100644
--- a/2024/CVE-2024-23741.json
+++ b/2024/CVE-2024-23741.json
@@ -2,14 +2,14 @@
{
"id": 748203643,
"name": "CVE-2024-23741",
- "full_name": "V3x0r\/CVE-2024-23741",
+ "full_name": "giovannipajeu1\/CVE-2024-23741",
"owner": {
- "login": "V3x0r",
+ "login": "giovannipajeu1",
"id": 83291215,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83291215?v=4",
- "html_url": "https:\/\/github.com\/V3x0r"
+ "html_url": "https:\/\/github.com\/giovannipajeu1"
},
- "html_url": "https:\/\/github.com\/V3x0r\/CVE-2024-23741",
+ "html_url": "https:\/\/github.com\/giovannipajeu1\/CVE-2024-23741",
"description": "CVE-2024-23741",
"fork": false,
"created_at": "2024-01-25T13:49:10Z",
diff --git a/2024/CVE-2024-23742.json b/2024/CVE-2024-23742.json
index f8fd43e60d..48e0e1e3c1 100644
--- a/2024/CVE-2024-23742.json
+++ b/2024/CVE-2024-23742.json
@@ -2,14 +2,14 @@
{
"id": 748204912,
"name": "CVE-2024-23742",
- "full_name": "V3x0r\/CVE-2024-23742",
+ "full_name": "giovannipajeu1\/CVE-2024-23742",
"owner": {
- "login": "V3x0r",
+ "login": "giovannipajeu1",
"id": 83291215,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83291215?v=4",
- "html_url": "https:\/\/github.com\/V3x0r"
+ "html_url": "https:\/\/github.com\/giovannipajeu1"
},
- "html_url": "https:\/\/github.com\/V3x0r\/CVE-2024-23742",
+ "html_url": "https:\/\/github.com\/giovannipajeu1\/CVE-2024-23742",
"description": "CVE-2024-23742",
"fork": false,
"created_at": "2024-01-25T13:52:05Z",
diff --git a/2024/CVE-2024-23743.json b/2024/CVE-2024-23743.json
index d6a8118353..cf9386fb12 100644
--- a/2024/CVE-2024-23743.json
+++ b/2024/CVE-2024-23743.json
@@ -2,14 +2,14 @@
{
"id": 733590093,
"name": "CVE-2024-23743",
- "full_name": "V3x0r\/CVE-2024-23743",
+ "full_name": "giovannipajeu1\/CVE-2024-23743",
"owner": {
- "login": "V3x0r",
+ "login": "giovannipajeu1",
"id": 83291215,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83291215?v=4",
- "html_url": "https:\/\/github.com\/V3x0r"
+ "html_url": "https:\/\/github.com\/giovannipajeu1"
},
- "html_url": "https:\/\/github.com\/V3x0r\/CVE-2024-23743",
+ "html_url": "https:\/\/github.com\/giovannipajeu1\/CVE-2024-23743",
"description": null,
"fork": false,
"created_at": "2023-12-19T17:07:27Z",
diff --git a/2024/CVE-2024-23897.json b/2024/CVE-2024-23897.json
index 851ad06190..3043551cfe 100644
--- a/2024/CVE-2024-23897.json
+++ b/2024/CVE-2024-23897.json
@@ -103,19 +103,19 @@
"description": "CVE-2024-23897 | Jenkins <= 2.441 & <= LTS 2.426.2 PoC and scanner. ",
"fork": false,
"created_at": "2024-01-26T19:00:03Z",
- "updated_at": "2024-02-25T16:36:17Z",
+ "updated_at": "2024-02-25T23:25:01Z",
"pushed_at": "2024-01-27T10:38:25Z",
- "stargazers_count": 17,
- "watchers_count": 17,
+ "stargazers_count": 18,
+ "watchers_count": 18,
"has_discussions": false,
- "forks_count": 4,
+ "forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 4,
- "watchers": 17,
+ "forks": 6,
+ "watchers": 18,
"score": 0,
"subscribers_count": 2
},
diff --git a/2024/CVE-2024-25600.json b/2024/CVE-2024-25600.json
index aad1d0f0fb..bc1cc7eb24 100644
--- a/2024/CVE-2024-25600.json
+++ b/2024/CVE-2024-25600.json
@@ -13,10 +13,10 @@
"description": "Unauthenticated Remote Code Execution – Bricks <= 1.9.6",
"fork": false,
"created_at": "2024-02-20T20:16:09Z",
- "updated_at": "2024-02-25T10:04:28Z",
- "pushed_at": "2024-02-24T23:46:37Z",
- "stargazers_count": 72,
- "watchers_count": 72,
+ "updated_at": "2024-02-25T23:54:38Z",
+ "pushed_at": "2024-02-25T21:50:09Z",
+ "stargazers_count": 75,
+ "watchers_count": 75,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
- "watchers": 72,
+ "watchers": 75,
"score": 0,
"subscribers_count": 1
},
@@ -43,10 +43,10 @@
"description": "Nuclei template and information about the POC for CVE-2024-25600",
"fork": false,
"created_at": "2024-02-21T00:27:33Z",
- "updated_at": "2024-02-25T16:18:05Z",
+ "updated_at": "2024-02-25T23:12:45Z",
"pushed_at": "2024-02-21T02:11:08Z",
- "stargazers_count": 22,
- "watchers_count": 22,
+ "stargazers_count": 23,
+ "watchers_count": 23,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
- "watchers": 22,
+ "watchers": 23,
"score": 0,
"subscribers_count": 1
},
diff --git a/README.md b/README.md
index 4e1470c7d3..672689c9b9 100644
--- a/README.md
+++ b/README.md
@@ -310,42 +310,42 @@
An issue in Postman version 10.22 and before on macOS allows a remote attacker to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings.
-- [V3x0r/CVE-2024-23738](https://github.com/V3x0r/CVE-2024-23738)
+- [giovannipajeu1/CVE-2024-23738](https://github.com/giovannipajeu1/CVE-2024-23738)
### CVE-2024-23739 (2024-01-27)
An issue in Discord for macOS version 0.0.291 and before, allows remote attackers to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings.
-- [V3x0r/CVE-2024-23739](https://github.com/V3x0r/CVE-2024-23739)
+- [giovannipajeu1/CVE-2024-23739](https://github.com/giovannipajeu1/CVE-2024-23739)
### CVE-2024-23740 (2024-01-27)
An issue in Kap for macOS version 3.6.0 and before, allows remote attackers to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings.
-- [V3x0r/CVE-2024-23740](https://github.com/V3x0r/CVE-2024-23740)
+- [giovannipajeu1/CVE-2024-23740](https://github.com/giovannipajeu1/CVE-2024-23740)
### CVE-2024-23741 (2024-01-27)
An issue in Hyper on macOS version 3.4.1 and before, allows remote attackers to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings.
-- [V3x0r/CVE-2024-23741](https://github.com/V3x0r/CVE-2024-23741)
+- [giovannipajeu1/CVE-2024-23741](https://github.com/giovannipajeu1/CVE-2024-23741)
### CVE-2024-23742 (2024-01-27)
An issue in Loom on macOS version 0.196.1 and before, allows remote attackers to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings.
-- [V3x0r/CVE-2024-23742](https://github.com/V3x0r/CVE-2024-23742)
+- [giovannipajeu1/CVE-2024-23742](https://github.com/giovannipajeu1/CVE-2024-23742)
### CVE-2024-23743 (2024-01-27)
An issue in Notion for macOS version 3.1.0 and before, allows remote attackers to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments components.
-- [V3x0r/CVE-2024-23743](https://github.com/V3x0r/CVE-2024-23743)
+- [giovannipajeu1/CVE-2024-23743](https://github.com/giovannipajeu1/CVE-2024-23743)
### CVE-2024-23745 (2024-01-30)
@@ -3246,6 +3246,13 @@
- [acceleratortroll/acceleratortroll](https://github.com/acceleratortroll/acceleratortroll)
+### CVE-2023-28218 (2023-04-11)
+
+Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
+
+
+- [h1bAna/CVE-2023-28218](https://github.com/h1bAna/CVE-2023-28218)
+
### CVE-2023-28229 (2023-04-11)
Windows CNG Key Isolation Service Elevation of Privilege Vulnerability
@@ -7428,7 +7435,7 @@
An issue in Evernote Evernote for MacOS v.10.68.2 allows a remote attacker to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments components.
-- [V3x0r/CVE-2023-50643](https://github.com/V3x0r/CVE-2023-50643)
+- [giovannipajeu1/CVE-2023-50643](https://github.com/giovannipajeu1/CVE-2023-50643)
### CVE-2023-50917 (2023-12-15)
@@ -33518,6 +33525,7 @@
- [Synacktiv-contrib/exploiting-cve-2017-5123](https://github.com/Synacktiv-contrib/exploiting-cve-2017-5123)
- [teawater/CVE-2017-5123](https://github.com/teawater/CVE-2017-5123)
- [c3r34lk1ll3r/CVE-2017-5123](https://github.com/c3r34lk1ll3r/CVE-2017-5123)
+- [h1bAna/CVE-2017-5123](https://github.com/h1bAna/CVE-2017-5123)
### CVE-2017-5124 (2018-02-07)