From 308c151ddd18dae0439efd9603364c171f9d4e4c Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Mon, 26 Feb 2024 09:26:33 +0900 Subject: [PATCH] Auto Update 2024/02/26 00:26:33 --- 2017/CVE-2017-0781.json | 8 ++++---- 2017/CVE-2017-11882.json | 8 ++++---- 2017/CVE-2017-5123.json | 30 ++++++++++++++++++++++++++++++ 2019/CVE-2019-17558.json | 4 ++-- 2019/CVE-2019-19781.json | 8 ++++---- 2020/CVE-2020-10189.json | 2 +- 2020/CVE-2020-14882.json | 4 ++-- 2020/CVE-2020-3452.json | 2 +- 2021/CVE-2021-3156.json | 12 ++++++------ 2021/CVE-2021-36260.json | 8 ++++---- 2021/CVE-2021-37580.json | 8 ++++---- 2021/CVE-2021-38647.json | 8 ++++---- 2021/CVE-2021-40449.json | 8 ++++---- 2021/CVE-2021-42287.json | 2 +- 2021/CVE-2021-44228.json | 8 ++++---- 2022/CVE-2022-1388.json | 8 ++++---- 2022/CVE-2022-23131.json | 8 ++++---- 2022/CVE-2022-26134.json | 8 ++++---- 2022/CVE-2022-26809.json | 8 ++++---- 2023/CVE-2023-21768.json | 2 +- 2023/CVE-2023-22515.json | 8 ++++---- 2023/CVE-2023-23397.json | 8 ++++---- 2023/CVE-2023-28218.json | 32 ++++++++++++++++++++++++++++++++ 2023/CVE-2023-3076.json | 8 ++++---- 2023/CVE-2023-30943.json | 8 ++++---- 2023/CVE-2023-34362.json | 4 ++-- 2023/CVE-2023-34761.json | 4 ++-- 2023/CVE-2023-38041.json | 4 ++-- 2023/CVE-2023-4911.json | 8 ++++---- 2023/CVE-2023-50387.json | 8 ++++---- 2023/CVE-2023-50643.json | 8 ++++---- 2024/CVE-2024-20656.json | 8 ++++---- 2024/CVE-2024-23738.json | 8 ++++---- 2024/CVE-2024-23739.json | 8 ++++---- 2024/CVE-2024-23740.json | 8 ++++---- 2024/CVE-2024-23741.json | 8 ++++---- 2024/CVE-2024-23742.json | 8 ++++---- 2024/CVE-2024-23743.json | 8 ++++---- 2024/CVE-2024-23897.json | 12 ++++++------ 2024/CVE-2024-25600.json | 18 +++++++++--------- README.md | 22 +++++++++++++++------- 41 files changed, 216 insertions(+), 146 deletions(-) create mode 100644 2023/CVE-2023-28218.json diff --git a/2017/CVE-2017-0781.json b/2017/CVE-2017-0781.json index 7dd6f643e2..eebdb8a707 100644 --- a/2017/CVE-2017-0781.json +++ b/2017/CVE-2017-0781.json @@ -49,10 +49,10 @@ "description": "Android Blueborne RCE CVE-2017-0781", "fork": false, "created_at": "2018-03-17T21:07:24Z", - "updated_at": "2024-01-17T16:00:49Z", + "updated_at": "2024-02-25T20:04:32Z", "pushed_at": "2018-04-04T12:59:18Z", - "stargazers_count": 73, - "watchers_count": 73, + "stargazers_count": 74, + "watchers_count": 74, "has_discussions": false, "forks_count": 24, "allow_forking": true, @@ -61,7 +61,7 @@ "topics": [], "visibility": "public", "forks": 24, - "watchers": 73, + "watchers": 74, "score": 0, "subscribers_count": 6 }, diff --git a/2017/CVE-2017-11882.json b/2017/CVE-2017-11882.json index e63b565a53..2677feff4b 100644 --- a/2017/CVE-2017-11882.json +++ b/2017/CVE-2017-11882.json @@ -133,10 +133,10 @@ "description": "CVE-2017-11882 Exploit accepts over 17k bytes long command\/code in maximum.", "fork": false, "created_at": "2017-11-21T15:22:41Z", - "updated_at": "2024-01-17T16:00:34Z", + "updated_at": "2024-02-25T20:21:12Z", "pushed_at": "2017-12-06T12:47:31Z", - "stargazers_count": 316, - "watchers_count": 316, + "stargazers_count": 317, + "watchers_count": 317, "has_discussions": false, "forks_count": 101, "allow_forking": true, @@ -150,7 +150,7 @@ ], "visibility": "public", "forks": 101, - "watchers": 316, + "watchers": 317, "score": 0, "subscribers_count": 18 }, diff --git a/2017/CVE-2017-5123.json b/2017/CVE-2017-5123.json index 8dcf74d0f8..7fd6ed5ddd 100644 --- a/2017/CVE-2017-5123.json +++ b/2017/CVE-2017-5123.json @@ -153,5 +153,35 @@ "watchers": 29, "score": 0, "subscribers_count": 2 + }, + { + "id": 612740053, + "name": "CVE-2017-5123", + "full_name": "h1bAna\/CVE-2017-5123", + "owner": { + "login": "h1bAna", + "id": 70074237, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70074237?v=4", + "html_url": "https:\/\/github.com\/h1bAna" + }, + "html_url": "https:\/\/github.com\/h1bAna\/CVE-2017-5123", + "description": null, + "fork": false, + "created_at": "2023-03-11T20:45:15Z", + "updated_at": "2024-02-25T18:57:44Z", + "pushed_at": "2023-03-11T20:52:25Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index ace779e0ba..d0164ef595 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -48,7 +48,7 @@ "stargazers_count": 3988, "watchers_count": 3988, "has_discussions": false, - "forks_count": 1079, + "forks_count": 1078, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -74,7 +74,7 @@ "webshell" ], "visibility": "public", - "forks": 1079, + "forks": 1078, "watchers": 3988, "score": 0, "subscribers_count": 153 diff --git a/2019/CVE-2019-19781.json b/2019/CVE-2019-19781.json index 10f092a166..1e20002799 100644 --- a/2019/CVE-2019-19781.json +++ b/2019/CVE-2019-19781.json @@ -43,10 +43,10 @@ "description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.", "fork": false, "created_at": "2020-01-11T00:08:27Z", - "updated_at": "2024-01-12T01:26:35Z", + "updated_at": "2024-02-25T21:00:40Z", "pushed_at": "2020-01-22T20:23:51Z", - "stargazers_count": 571, - "watchers_count": 571, + "stargazers_count": 570, + "watchers_count": 570, "has_discussions": false, "forks_count": 131, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 131, - "watchers": 571, + "watchers": 570, "score": 0, "subscribers_count": 29 }, diff --git a/2020/CVE-2020-10189.json b/2020/CVE-2020-10189.json index b60fc5e518..e36ccca298 100644 --- a/2020/CVE-2020-10189.json +++ b/2020/CVE-2020-10189.json @@ -57,6 +57,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index e02bf733b7..a0ba5f0656 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -18,7 +18,7 @@ "stargazers_count": 3988, "watchers_count": 3988, "has_discussions": false, - "forks_count": 1079, + "forks_count": 1078, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -44,7 +44,7 @@ "webshell" ], "visibility": "public", - "forks": 1079, + "forks": 1078, "watchers": 3988, "score": 0, "subscribers_count": 153 diff --git a/2020/CVE-2020-3452.json b/2020/CVE-2020-3452.json index c5a5bf271d..58b167add1 100644 --- a/2020/CVE-2020-3452.json +++ b/2020/CVE-2020-3452.json @@ -652,6 +652,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index ed9595e57b..cafa8e2a0c 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -470,10 +470,10 @@ "description": null, "fork": false, "created_at": "2021-01-30T20:39:58Z", - "updated_at": "2024-02-18T18:33:40Z", + "updated_at": "2024-02-25T20:52:21Z", "pushed_at": "2021-02-02T17:07:09Z", - "stargazers_count": 908, - "watchers_count": 908, + "stargazers_count": 907, + "watchers_count": 907, "has_discussions": false, "forks_count": 242, "allow_forking": true, @@ -482,7 +482,7 @@ "topics": [], "visibility": "public", "forks": 242, - "watchers": 908, + "watchers": 907, "score": 0, "subscribers_count": 27 }, @@ -899,13 +899,13 @@ "stargazers_count": 49, "watchers_count": 49, "has_discussions": false, - "forks_count": 16, + "forks_count": 15, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 16, + "forks": 15, "watchers": 49, "score": 0, "subscribers_count": 1 diff --git a/2021/CVE-2021-36260.json b/2021/CVE-2021-36260.json index 4c713bb25c..a9d64aab4c 100644 --- a/2021/CVE-2021-36260.json +++ b/2021/CVE-2021-36260.json @@ -43,10 +43,10 @@ "description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.", "fork": false, "created_at": "2021-10-27T15:51:12Z", - "updated_at": "2024-02-12T00:50:35Z", + "updated_at": "2024-02-25T20:45:56Z", "pushed_at": "2021-10-28T06:37:37Z", - "stargazers_count": 223, - "watchers_count": 223, + "stargazers_count": 222, + "watchers_count": 222, "has_discussions": false, "forks_count": 73, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 73, - "watchers": 223, + "watchers": 222, "score": 0, "subscribers_count": 5 }, diff --git a/2021/CVE-2021-37580.json b/2021/CVE-2021-37580.json index 2a134f191a..1138366b57 100644 --- a/2021/CVE-2021-37580.json +++ b/2021/CVE-2021-37580.json @@ -43,10 +43,10 @@ "description": "CVE-2021-37580的poc", "fork": false, "created_at": "2021-11-17T13:26:46Z", - "updated_at": "2024-01-17T16:03:41Z", + "updated_at": "2024-02-25T20:55:37Z", "pushed_at": "2023-06-18T01:19:09Z", - "stargazers_count": 39, - "watchers_count": 39, + "stargazers_count": 38, + "watchers_count": 38, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 11, - "watchers": 39, + "watchers": 38, "score": 0, "subscribers_count": 1 }, diff --git a/2021/CVE-2021-38647.json b/2021/CVE-2021-38647.json index 25e6e25eb6..2059821fe9 100644 --- a/2021/CVE-2021-38647.json +++ b/2021/CVE-2021-38647.json @@ -228,10 +228,10 @@ "description": "CVE-2021-38647 - POC to exploit unauthenticated RCE #OMIGOD", "fork": false, "created_at": "2021-09-20T16:29:48Z", - "updated_at": "2023-12-25T18:38:51Z", + "updated_at": "2024-02-25T23:01:16Z", "pushed_at": "2021-09-26T04:37:04Z", - "stargazers_count": 66, - "watchers_count": 66, + "stargazers_count": 67, + "watchers_count": 67, "has_discussions": false, "forks_count": 24, "allow_forking": true, @@ -240,7 +240,7 @@ "topics": [], "visibility": "public", "forks": 24, - "watchers": 66, + "watchers": 67, "score": 0, "subscribers_count": 5 }, diff --git a/2021/CVE-2021-40449.json b/2021/CVE-2021-40449.json index 89e99169f7..b4af297080 100644 --- a/2021/CVE-2021-40449.json +++ b/2021/CVE-2021-40449.json @@ -13,10 +13,10 @@ "description": "Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)", "fork": false, "created_at": "2021-10-16T16:17:44Z", - "updated_at": "2024-02-05T01:18:54Z", + "updated_at": "2024-02-25T20:48:14Z", "pushed_at": "2021-11-11T17:09:56Z", - "stargazers_count": 456, - "watchers_count": 456, + "stargazers_count": 455, + "watchers_count": 455, "has_discussions": false, "forks_count": 96, "allow_forking": true, @@ -27,7 +27,7 @@ ], "visibility": "public", "forks": 96, - "watchers": 456, + "watchers": 455, "score": 0, "subscribers_count": 13 }, diff --git a/2021/CVE-2021-42287.json b/2021/CVE-2021-42287.json index 1c9a8c3b97..d20942ef3f 100644 --- a/2021/CVE-2021-42287.json +++ b/2021/CVE-2021-42287.json @@ -13,7 +13,7 @@ "description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.", "fork": false, "created_at": "2021-12-11T19:27:30Z", - "updated_at": "2024-02-22T23:16:18Z", + "updated_at": "2024-02-25T21:07:07Z", "pushed_at": "2021-12-16T09:50:15Z", "stargazers_count": 1284, "watchers_count": 1284, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 5d4b374d9a..7ae0512ecc 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -369,10 +369,10 @@ "description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).", "fork": false, "created_at": "2021-12-10T12:38:20Z", - "updated_at": "2024-02-23T19:44:00Z", + "updated_at": "2024-02-25T20:55:58Z", "pushed_at": "2023-05-11T11:29:46Z", - "stargazers_count": 1081, - "watchers_count": 1081, + "stargazers_count": 1080, + "watchers_count": 1080, "has_discussions": false, "forks_count": 522, "allow_forking": true, @@ -383,7 +383,7 @@ ], "visibility": "public", "forks": 522, - "watchers": 1081, + "watchers": 1080, "score": 0, "subscribers_count": 23 }, diff --git a/2022/CVE-2022-1388.json b/2022/CVE-2022-1388.json index 6a8d001331..3b97953211 100644 --- a/2022/CVE-2022-1388.json +++ b/2022/CVE-2022-1388.json @@ -320,10 +320,10 @@ "description": "F5 BIG-IP RCE exploitation (CVE-2022-1388)", "fork": false, "created_at": "2022-05-09T10:34:38Z", - "updated_at": "2024-01-24T11:19:45Z", + "updated_at": "2024-02-25T20:44:22Z", "pushed_at": "2022-05-16T12:40:51Z", - "stargazers_count": 90, - "watchers_count": 90, + "stargazers_count": 89, + "watchers_count": 89, "has_discussions": false, "forks_count": 20, "allow_forking": true, @@ -332,7 +332,7 @@ "topics": [], "visibility": "public", "forks": 20, - "watchers": 90, + "watchers": 89, "score": 0, "subscribers_count": 2 }, diff --git a/2022/CVE-2022-23131.json b/2022/CVE-2022-23131.json index eb9a66e4dd..0507d9b67d 100644 --- a/2022/CVE-2022-23131.json +++ b/2022/CVE-2022-23131.json @@ -103,10 +103,10 @@ "description": null, "fork": false, "created_at": "2022-02-18T14:48:53Z", - "updated_at": "2022-06-01T14:58:14Z", + "updated_at": "2024-02-25T20:55:02Z", "pushed_at": "2022-02-19T03:14:47Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -115,7 +115,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 3, + "watchers": 2, "score": 0, "subscribers_count": 1 }, diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index 98b37f7c34..2c57fbf496 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -13,10 +13,10 @@ "description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。", "fork": false, "created_at": "2022-05-31T07:44:01Z", - "updated_at": "2024-02-21T02:00:55Z", + "updated_at": "2024-02-25T21:59:55Z", "pushed_at": "2023-02-26T14:06:05Z", - "stargazers_count": 1097, - "watchers_count": 1097, + "stargazers_count": 1098, + "watchers_count": 1098, "has_discussions": true, "forks_count": 186, "allow_forking": true, @@ -45,7 +45,7 @@ ], "visibility": "public", "forks": 186, - "watchers": 1097, + "watchers": 1098, "score": 0, "subscribers_count": 18 }, diff --git a/2022/CVE-2022-26809.json b/2022/CVE-2022-26809.json index 21a7933425..38445cd6b1 100644 --- a/2022/CVE-2022-26809.json +++ b/2022/CVE-2022-26809.json @@ -227,10 +227,10 @@ "description": "PoC for CVE-2022-26809, analisys and considerations are shown in the github.io.", "fork": false, "created_at": "2022-06-13T11:08:33Z", - "updated_at": "2024-01-24T11:20:12Z", + "updated_at": "2024-02-25T20:44:39Z", "pushed_at": "2022-06-18T13:53:53Z", - "stargazers_count": 109, - "watchers_count": 109, + "stargazers_count": 108, + "watchers_count": 108, "has_discussions": false, "forks_count": 31, "allow_forking": true, @@ -239,7 +239,7 @@ "topics": [], "visibility": "public", "forks": 31, - "watchers": 109, + "watchers": 108, "score": 0, "subscribers_count": 5 }, diff --git a/2023/CVE-2023-21768.json b/2023/CVE-2023-21768.json index 80021b57f3..fc1e028d3d 100644 --- a/2023/CVE-2023-21768.json +++ b/2023/CVE-2023-21768.json @@ -201,7 +201,7 @@ "description": null, "fork": false, "created_at": "2023-04-05T02:05:17Z", - "updated_at": "2023-10-31T12:09:01Z", + "updated_at": "2024-02-25T18:56:42Z", "pushed_at": "2023-04-05T02:07:22Z", "stargazers_count": 0, "watchers_count": 0, diff --git a/2023/CVE-2023-22515.json b/2023/CVE-2023-22515.json index fb86c81b2a..7b4cf78d08 100644 --- a/2023/CVE-2023-22515.json +++ b/2023/CVE-2023-22515.json @@ -619,10 +619,10 @@ "description": "Passive version detection method for CVE-2023-22515 using Nuclei scanner", "fork": false, "created_at": "2024-02-24T16:04:35Z", - "updated_at": "2024-02-25T08:06:42Z", + "updated_at": "2024-02-25T20:18:48Z", "pushed_at": "2024-02-24T16:12:56Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -631,7 +631,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-23397.json b/2023/CVE-2023-23397.json index ad24918f1f..e27f447dc3 100644 --- a/2023/CVE-2023-23397.json +++ b/2023/CVE-2023-23397.json @@ -13,10 +13,10 @@ "description": "Exploit for the CVE-2023-23397", "fork": false, "created_at": "2023-03-15T17:03:38Z", - "updated_at": "2023-12-23T14:47:45Z", + "updated_at": "2024-02-25T20:22:13Z", "pushed_at": "2023-03-15T17:53:53Z", - "stargazers_count": 157, - "watchers_count": 157, + "stargazers_count": 158, + "watchers_count": 158, "has_discussions": false, "forks_count": 46, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 46, - "watchers": 157, + "watchers": 158, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-28218.json b/2023/CVE-2023-28218.json new file mode 100644 index 0000000000..cfdf5a9167 --- /dev/null +++ b/2023/CVE-2023-28218.json @@ -0,0 +1,32 @@ +[ + { + "id": 648327862, + "name": "CVE-2023-28218", + "full_name": "h1bAna\/CVE-2023-28218", + "owner": { + "login": "h1bAna", + "id": 70074237, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70074237?v=4", + "html_url": "https:\/\/github.com\/h1bAna" + }, + "html_url": "https:\/\/github.com\/h1bAna\/CVE-2023-28218", + "description": null, + "fork": false, + "created_at": "2023-06-01T18:04:32Z", + "updated_at": "2024-02-25T18:56:02Z", + "pushed_at": "2023-06-01T18:10:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-3076.json b/2023/CVE-2023-3076.json index b0f7fb2e4a..2496c21a31 100644 --- a/2023/CVE-2023-3076.json +++ b/2023/CVE-2023-3076.json @@ -13,10 +13,10 @@ "description": "Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (Mass Add Admin + PHP File Upload)", "fork": false, "created_at": "2023-09-19T04:59:01Z", - "updated_at": "2024-02-24T11:42:56Z", + "updated_at": "2024-02-25T21:07:38Z", "pushed_at": "2023-09-20T11:41:02Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 13, + "watchers_count": 13, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -36,7 +36,7 @@ ], "visibility": "public", "forks": 2, - "watchers": 12, + "watchers": 13, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-30943.json b/2023/CVE-2023-30943.json index 0c3890f6fb..13fe9b46e2 100644 --- a/2023/CVE-2023-30943.json +++ b/2023/CVE-2023-30943.json @@ -13,10 +13,10 @@ "description": "CVE-2023-30943 RCE PoC", "fork": false, "created_at": "2023-08-31T08:18:17Z", - "updated_at": "2023-11-02T19:29:54Z", + "updated_at": "2024-02-26T00:03:58Z", "pushed_at": "2023-08-31T09:39:18Z", - "stargazers_count": 14, - "watchers_count": 14, + "stargazers_count": 15, + "watchers_count": 15, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 14, + "watchers": 15, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-34362.json b/2023/CVE-2023-34362.json index 32b51a908d..9526fc0328 100644 --- a/2023/CVE-2023-34362.json +++ b/2023/CVE-2023-34362.json @@ -78,13 +78,13 @@ "stargazers_count": 62, "watchers_count": 62, "has_discussions": false, - "forks_count": 25, + "forks_count": 23, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 25, + "forks": 23, "watchers": 62, "score": 0, "subscribers_count": 4 diff --git a/2023/CVE-2023-34761.json b/2023/CVE-2023-34761.json index 248dde32a1..a039ab1784 100644 --- a/2023/CVE-2023-34761.json +++ b/2023/CVE-2023-34761.json @@ -10,10 +10,10 @@ "html_url": "https:\/\/github.com\/actuator" }, "html_url": "https:\/\/github.com\/actuator\/7-Eleven-Bluetooth-Smart-Cup-Jailbreak", - "description": "'Hacking' a 7-Eleven Bluetooth Smart Cup 🙃 | CVE-2023-34761", + "description": "'Hacking' a 7-Eleven Bluetooth Smart Cup | CVE-2023-34761", "fork": false, "created_at": "2023-05-04T18:37:39Z", - "updated_at": "2024-02-06T17:31:56Z", + "updated_at": "2024-02-25T23:34:37Z", "pushed_at": "2023-06-23T00:10:55Z", "stargazers_count": 20, "watchers_count": 20, diff --git a/2023/CVE-2023-38041.json b/2023/CVE-2023-38041.json index 1870dfcb01..ca94f68cb4 100644 --- a/2023/CVE-2023-38041.json +++ b/2023/CVE-2023-38041.json @@ -18,13 +18,13 @@ "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 0 diff --git a/2023/CVE-2023-4911.json b/2023/CVE-2023-4911.json index b3c6d552c0..3e7d7d4321 100644 --- a/2023/CVE-2023-4911.json +++ b/2023/CVE-2023-4911.json @@ -43,10 +43,10 @@ "description": "PoC for CVE-2023-4911", "fork": false, "created_at": "2023-10-04T14:12:16Z", - "updated_at": "2024-02-14T15:46:11Z", + "updated_at": "2024-02-25T20:28:07Z", "pushed_at": "2023-10-04T14:16:36Z", - "stargazers_count": 370, - "watchers_count": 370, + "stargazers_count": 371, + "watchers_count": 371, "has_discussions": false, "forks_count": 58, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 58, - "watchers": 370, + "watchers": 371, "score": 0, "subscribers_count": 5 }, diff --git a/2023/CVE-2023-50387.json b/2023/CVE-2023-50387.json index ae9c315f81..c90352b97c 100644 --- a/2023/CVE-2023-50387.json +++ b/2023/CVE-2023-50387.json @@ -13,10 +13,10 @@ "description": "KeyTrap (DNSSEC)", "fork": false, "created_at": "2024-02-18T21:50:04Z", - "updated_at": "2024-02-24T22:35:24Z", + "updated_at": "2024-02-26T00:19:11Z", "pushed_at": "2024-02-18T22:15:14Z", - "stargazers_count": 25, - "watchers_count": 25, + "stargazers_count": 26, + "watchers_count": 26, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 8, - "watchers": 25, + "watchers": 26, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-50643.json b/2023/CVE-2023-50643.json index 08f56931bc..a6dee58ddb 100644 --- a/2023/CVE-2023-50643.json +++ b/2023/CVE-2023-50643.json @@ -2,14 +2,14 @@ { "id": 729209972, "name": "CVE-2023-50643", - "full_name": "V3x0r\/CVE-2023-50643", + "full_name": "giovannipajeu1\/CVE-2023-50643", "owner": { - "login": "V3x0r", + "login": "giovannipajeu1", "id": 83291215, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83291215?v=4", - "html_url": "https:\/\/github.com\/V3x0r" + "html_url": "https:\/\/github.com\/giovannipajeu1" }, - "html_url": "https:\/\/github.com\/V3x0r\/CVE-2023-50643", + "html_url": "https:\/\/github.com\/giovannipajeu1\/CVE-2023-50643", "description": "CVE-2023-50643", "fork": false, "created_at": "2023-12-08T16:37:16Z", diff --git a/2024/CVE-2024-20656.json b/2024/CVE-2024-20656.json index 727690d957..d0fa867b9d 100644 --- a/2024/CVE-2024-20656.json +++ b/2024/CVE-2024-20656.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2024-01-12T15:08:01Z", - "updated_at": "2024-02-24T07:10:33Z", + "updated_at": "2024-02-25T21:19:41Z", "pushed_at": "2024-01-14T07:14:33Z", - "stargazers_count": 106, - "watchers_count": 106, + "stargazers_count": 105, + "watchers_count": 105, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 16, - "watchers": 106, + "watchers": 105, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-23738.json b/2024/CVE-2024-23738.json index 432b2a359f..0153f1745d 100644 --- a/2024/CVE-2024-23738.json +++ b/2024/CVE-2024-23738.json @@ -2,14 +2,14 @@ { "id": 748194668, "name": "CVE-2024-23738", - "full_name": "V3x0r\/CVE-2024-23738", + "full_name": "giovannipajeu1\/CVE-2024-23738", "owner": { - "login": "V3x0r", + "login": "giovannipajeu1", "id": 83291215, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83291215?v=4", - "html_url": "https:\/\/github.com\/V3x0r" + "html_url": "https:\/\/github.com\/giovannipajeu1" }, - "html_url": "https:\/\/github.com\/V3x0r\/CVE-2024-23738", + "html_url": "https:\/\/github.com\/giovannipajeu1\/CVE-2024-23738", "description": "CVE-2024-23738", "fork": false, "created_at": "2024-01-25T13:27:19Z", diff --git a/2024/CVE-2024-23739.json b/2024/CVE-2024-23739.json index 0b8a177ae3..cace0173a9 100644 --- a/2024/CVE-2024-23739.json +++ b/2024/CVE-2024-23739.json @@ -2,14 +2,14 @@ { "id": 748201476, "name": "CVE-2024-23739", - "full_name": "V3x0r\/CVE-2024-23739", + "full_name": "giovannipajeu1\/CVE-2024-23739", "owner": { - "login": "V3x0r", + "login": "giovannipajeu1", "id": 83291215, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83291215?v=4", - "html_url": "https:\/\/github.com\/V3x0r" + "html_url": "https:\/\/github.com\/giovannipajeu1" }, - "html_url": "https:\/\/github.com\/V3x0r\/CVE-2024-23739", + "html_url": "https:\/\/github.com\/giovannipajeu1\/CVE-2024-23739", "description": "CVE-2024-23739", "fork": false, "created_at": "2024-01-25T13:44:16Z", diff --git a/2024/CVE-2024-23740.json b/2024/CVE-2024-23740.json index d11a01f9aa..bed39e927f 100644 --- a/2024/CVE-2024-23740.json +++ b/2024/CVE-2024-23740.json @@ -2,14 +2,14 @@ { "id": 748198610, "name": "CVE-2024-23740", - "full_name": "V3x0r\/CVE-2024-23740", + "full_name": "giovannipajeu1\/CVE-2024-23740", "owner": { - "login": "V3x0r", + "login": "giovannipajeu1", "id": 83291215, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83291215?v=4", - "html_url": "https:\/\/github.com\/V3x0r" + "html_url": "https:\/\/github.com\/giovannipajeu1" }, - "html_url": "https:\/\/github.com\/V3x0r\/CVE-2024-23740", + "html_url": "https:\/\/github.com\/giovannipajeu1\/CVE-2024-23740", "description": " CVE-2024-23739", "fork": false, "created_at": "2024-01-25T13:37:08Z", diff --git a/2024/CVE-2024-23741.json b/2024/CVE-2024-23741.json index 706d20dd0b..973cf498b6 100644 --- a/2024/CVE-2024-23741.json +++ b/2024/CVE-2024-23741.json @@ -2,14 +2,14 @@ { "id": 748203643, "name": "CVE-2024-23741", - "full_name": "V3x0r\/CVE-2024-23741", + "full_name": "giovannipajeu1\/CVE-2024-23741", "owner": { - "login": "V3x0r", + "login": "giovannipajeu1", "id": 83291215, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83291215?v=4", - "html_url": "https:\/\/github.com\/V3x0r" + "html_url": "https:\/\/github.com\/giovannipajeu1" }, - "html_url": "https:\/\/github.com\/V3x0r\/CVE-2024-23741", + "html_url": "https:\/\/github.com\/giovannipajeu1\/CVE-2024-23741", "description": "CVE-2024-23741", "fork": false, "created_at": "2024-01-25T13:49:10Z", diff --git a/2024/CVE-2024-23742.json b/2024/CVE-2024-23742.json index f8fd43e60d..48e0e1e3c1 100644 --- a/2024/CVE-2024-23742.json +++ b/2024/CVE-2024-23742.json @@ -2,14 +2,14 @@ { "id": 748204912, "name": "CVE-2024-23742", - "full_name": "V3x0r\/CVE-2024-23742", + "full_name": "giovannipajeu1\/CVE-2024-23742", "owner": { - "login": "V3x0r", + "login": "giovannipajeu1", "id": 83291215, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83291215?v=4", - "html_url": "https:\/\/github.com\/V3x0r" + "html_url": "https:\/\/github.com\/giovannipajeu1" }, - "html_url": "https:\/\/github.com\/V3x0r\/CVE-2024-23742", + "html_url": "https:\/\/github.com\/giovannipajeu1\/CVE-2024-23742", "description": "CVE-2024-23742", "fork": false, "created_at": "2024-01-25T13:52:05Z", diff --git a/2024/CVE-2024-23743.json b/2024/CVE-2024-23743.json index d6a8118353..cf9386fb12 100644 --- a/2024/CVE-2024-23743.json +++ b/2024/CVE-2024-23743.json @@ -2,14 +2,14 @@ { "id": 733590093, "name": "CVE-2024-23743", - "full_name": "V3x0r\/CVE-2024-23743", + "full_name": "giovannipajeu1\/CVE-2024-23743", "owner": { - "login": "V3x0r", + "login": "giovannipajeu1", "id": 83291215, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83291215?v=4", - "html_url": "https:\/\/github.com\/V3x0r" + "html_url": "https:\/\/github.com\/giovannipajeu1" }, - "html_url": "https:\/\/github.com\/V3x0r\/CVE-2024-23743", + "html_url": "https:\/\/github.com\/giovannipajeu1\/CVE-2024-23743", "description": null, "fork": false, "created_at": "2023-12-19T17:07:27Z", diff --git a/2024/CVE-2024-23897.json b/2024/CVE-2024-23897.json index 851ad06190..3043551cfe 100644 --- a/2024/CVE-2024-23897.json +++ b/2024/CVE-2024-23897.json @@ -103,19 +103,19 @@ "description": "CVE-2024-23897 | Jenkins <= 2.441 & <= LTS 2.426.2 PoC and scanner. ", "fork": false, "created_at": "2024-01-26T19:00:03Z", - "updated_at": "2024-02-25T16:36:17Z", + "updated_at": "2024-02-25T23:25:01Z", "pushed_at": "2024-01-27T10:38:25Z", - "stargazers_count": 17, - "watchers_count": 17, + "stargazers_count": 18, + "watchers_count": 18, "has_discussions": false, - "forks_count": 4, + "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 4, - "watchers": 17, + "forks": 6, + "watchers": 18, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-25600.json b/2024/CVE-2024-25600.json index aad1d0f0fb..bc1cc7eb24 100644 --- a/2024/CVE-2024-25600.json +++ b/2024/CVE-2024-25600.json @@ -13,10 +13,10 @@ "description": "Unauthenticated Remote Code Execution – Bricks <= 1.9.6", "fork": false, "created_at": "2024-02-20T20:16:09Z", - "updated_at": "2024-02-25T10:04:28Z", - "pushed_at": "2024-02-24T23:46:37Z", - "stargazers_count": 72, - "watchers_count": 72, + "updated_at": "2024-02-25T23:54:38Z", + "pushed_at": "2024-02-25T21:50:09Z", + "stargazers_count": 75, + "watchers_count": 75, "has_discussions": false, "forks_count": 14, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 14, - "watchers": 72, + "watchers": 75, "score": 0, "subscribers_count": 1 }, @@ -43,10 +43,10 @@ "description": "Nuclei template and information about the POC for CVE-2024-25600", "fork": false, "created_at": "2024-02-21T00:27:33Z", - "updated_at": "2024-02-25T16:18:05Z", + "updated_at": "2024-02-25T23:12:45Z", "pushed_at": "2024-02-21T02:11:08Z", - "stargazers_count": 22, - "watchers_count": 22, + "stargazers_count": 23, + "watchers_count": 23, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 22, + "watchers": 23, "score": 0, "subscribers_count": 1 }, diff --git a/README.md b/README.md index 4e1470c7d3..672689c9b9 100644 --- a/README.md +++ b/README.md @@ -310,42 +310,42 @@ An issue in Postman version 10.22 and before on macOS allows a remote attacker to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings. -- [V3x0r/CVE-2024-23738](https://github.com/V3x0r/CVE-2024-23738) +- [giovannipajeu1/CVE-2024-23738](https://github.com/giovannipajeu1/CVE-2024-23738) ### CVE-2024-23739 (2024-01-27) An issue in Discord for macOS version 0.0.291 and before, allows remote attackers to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings. -- [V3x0r/CVE-2024-23739](https://github.com/V3x0r/CVE-2024-23739) +- [giovannipajeu1/CVE-2024-23739](https://github.com/giovannipajeu1/CVE-2024-23739) ### CVE-2024-23740 (2024-01-27) An issue in Kap for macOS version 3.6.0 and before, allows remote attackers to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings. -- [V3x0r/CVE-2024-23740](https://github.com/V3x0r/CVE-2024-23740) +- [giovannipajeu1/CVE-2024-23740](https://github.com/giovannipajeu1/CVE-2024-23740) ### CVE-2024-23741 (2024-01-27) An issue in Hyper on macOS version 3.4.1 and before, allows remote attackers to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings. -- [V3x0r/CVE-2024-23741](https://github.com/V3x0r/CVE-2024-23741) +- [giovannipajeu1/CVE-2024-23741](https://github.com/giovannipajeu1/CVE-2024-23741) ### CVE-2024-23742 (2024-01-27) An issue in Loom on macOS version 0.196.1 and before, allows remote attackers to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings. -- [V3x0r/CVE-2024-23742](https://github.com/V3x0r/CVE-2024-23742) +- [giovannipajeu1/CVE-2024-23742](https://github.com/giovannipajeu1/CVE-2024-23742) ### CVE-2024-23743 (2024-01-27) An issue in Notion for macOS version 3.1.0 and before, allows remote attackers to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments components. -- [V3x0r/CVE-2024-23743](https://github.com/V3x0r/CVE-2024-23743) +- [giovannipajeu1/CVE-2024-23743](https://github.com/giovannipajeu1/CVE-2024-23743) ### CVE-2024-23745 (2024-01-30) @@ -3246,6 +3246,13 @@ - [acceleratortroll/acceleratortroll](https://github.com/acceleratortroll/acceleratortroll) +### CVE-2023-28218 (2023-04-11) + +Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability + + +- [h1bAna/CVE-2023-28218](https://github.com/h1bAna/CVE-2023-28218) + ### CVE-2023-28229 (2023-04-11) Windows CNG Key Isolation Service Elevation of Privilege Vulnerability @@ -7428,7 +7435,7 @@ An issue in Evernote Evernote for MacOS v.10.68.2 allows a remote attacker to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments components. -- [V3x0r/CVE-2023-50643](https://github.com/V3x0r/CVE-2023-50643) +- [giovannipajeu1/CVE-2023-50643](https://github.com/giovannipajeu1/CVE-2023-50643) ### CVE-2023-50917 (2023-12-15) @@ -33518,6 +33525,7 @@ - [Synacktiv-contrib/exploiting-cve-2017-5123](https://github.com/Synacktiv-contrib/exploiting-cve-2017-5123) - [teawater/CVE-2017-5123](https://github.com/teawater/CVE-2017-5123) - [c3r34lk1ll3r/CVE-2017-5123](https://github.com/c3r34lk1ll3r/CVE-2017-5123) +- [h1bAna/CVE-2017-5123](https://github.com/h1bAna/CVE-2017-5123) ### CVE-2017-5124 (2018-02-07)