From 35c9fb4010fc21d99ad46b77c883e89479d097ba Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Sat, 23 Mar 2024 21:27:00 +0900 Subject: [PATCH] Auto Update 2024/03/23 12:27:00 --- 2018/CVE-2018-19320.json | 8 +++--- 2019/CVE-2019-11043.json | 8 +++--- 2019/CVE-2019-15043.json | 8 +++--- 2020/CVE-2020-1472.json | 4 +-- 2020/CVE-2020-1938.json | 4 +-- 2021/CVE-2021-36260.json | 24 ++++++++-------- 2021/CVE-2021-44228.json | 12 ++++---- 2022/CVE-2022-0847.json | 8 +++--- 2022/CVE-2022-1386.json | 8 +++--- 2022/CVE-2022-1388.json | 40 +++++++++++++-------------- 2022/CVE-2022-38694.json | 8 +++--- 2022/CVE-2022-41040.json | 4 +-- 2023/CVE-2023-22515.json | 8 +++--- 2023/CVE-2023-32784.json | 8 +++--- 2023/CVE-2023-33580.json | 40 +++++++++++++++++++++++++++ 2023/CVE-2023-3519.json | 8 +++--- 2023/CVE-2023-36424.json | 12 ++++---- 2023/CVE-2023-38646.json | 8 +++--- 2023/CVE-2023-46747.json | 12 ++++---- 2023/CVE-2023-46805.json | 30 -------------------- 2023/CVE-2023-48788.json | 60 ---------------------------------------- 2023/CVE-2023-7028.json | 30 -------------------- 2024/CVE-2024-21633.json | 8 +++--- 2024/CVE-2024-21762.json | 60 ---------------------------------------- 2024/CVE-2024-21887.json | 30 -------------------- 2024/CVE-2024-23897.json | 30 -------------------- 2024/CVE-2024-2432.json | 8 +++--- README.md | 15 +++++----- 28 files changed, 151 insertions(+), 352 deletions(-) create mode 100644 2023/CVE-2023-33580.json diff --git a/2018/CVE-2018-19320.json b/2018/CVE-2018-19320.json index 3924717240..ca5f6845be 100644 --- a/2018/CVE-2018-19320.json +++ b/2018/CVE-2018-19320.json @@ -73,10 +73,10 @@ "description": "Unsigned driver loader using CVE-2018-19320", "fork": false, "created_at": "2022-11-12T05:48:13Z", - "updated_at": "2024-03-18T16:52:46Z", + "updated_at": "2024-03-23T09:21:24Z", "pushed_at": "2023-04-09T13:50:29Z", - "stargazers_count": 130, - "watchers_count": 130, + "stargazers_count": 131, + "watchers_count": 131, "has_discussions": false, "forks_count": 35, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 35, - "watchers": 130, + "watchers": 131, "score": 0, "subscribers_count": 6 }, diff --git a/2019/CVE-2019-11043.json b/2019/CVE-2019-11043.json index 56574324e4..bdae45b678 100644 --- a/2019/CVE-2019-11043.json +++ b/2019/CVE-2019-11043.json @@ -13,10 +13,10 @@ "description": "Exploit for CVE-2019-11043", "fork": false, "created_at": "2019-09-23T21:37:27Z", - "updated_at": "2024-03-22T01:51:57Z", + "updated_at": "2024-03-23T10:28:11Z", "pushed_at": "2019-11-12T18:53:14Z", - "stargazers_count": 1779, - "watchers_count": 1779, + "stargazers_count": 1780, + "watchers_count": 1780, "has_discussions": false, "forks_count": 259, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 259, - "watchers": 1779, + "watchers": 1780, "score": 0, "subscribers_count": 37 }, diff --git a/2019/CVE-2019-15043.json b/2019/CVE-2019-15043.json index 93d0dd6afc..1fb75caa3d 100644 --- a/2019/CVE-2019-15043.json +++ b/2019/CVE-2019-15043.json @@ -13,10 +13,10 @@ "description": "POC scanner for the Grafana vulnerability CVE-2019-15043", "fork": false, "created_at": "2020-08-01T21:31:46Z", - "updated_at": "2023-02-08T07:03:20Z", + "updated_at": "2024-03-23T10:55:23Z", "pushed_at": "2022-12-08T11:19:45Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 7, + "watchers": 8, "score": 0, "subscribers_count": 1 } diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index a19f13de7c..b7cca0d0f5 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -108,13 +108,13 @@ "stargazers_count": 1127, "watchers_count": 1127, "has_discussions": false, - "forks_count": 283, + "forks_count": 284, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 283, + "forks": 284, "watchers": 1127, "score": 0, "subscribers_count": 35 diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index 5b491a75dc..699c4df6d8 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -198,13 +198,13 @@ "stargazers_count": 48, "watchers_count": 48, "has_discussions": false, - "forks_count": 19, + "forks_count": 18, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 19, + "forks": 18, "watchers": 48, "score": 0, "subscribers_count": 3 diff --git a/2021/CVE-2021-36260.json b/2021/CVE-2021-36260.json index 0e2929eef7..d42f593e7b 100644 --- a/2021/CVE-2021-36260.json +++ b/2021/CVE-2021-36260.json @@ -43,19 +43,19 @@ "description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.", "fork": false, "created_at": "2021-10-27T15:51:12Z", - "updated_at": "2024-03-20T10:22:40Z", + "updated_at": "2024-03-23T08:56:09Z", "pushed_at": "2021-10-28T06:37:37Z", - "stargazers_count": 225, - "watchers_count": 225, + "stargazers_count": 227, + "watchers_count": 227, "has_discussions": false, - "forks_count": 73, + "forks_count": 72, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 73, - "watchers": 225, + "forks": 72, + "watchers": 227, "score": 0, "subscribers_count": 5 }, @@ -133,12 +133,12 @@ "description": "海康威视RCE漏洞 批量检测和利用工具", "fork": false, "created_at": "2022-08-03T17:27:59Z", - "updated_at": "2024-03-06T17:18:36Z", + "updated_at": "2024-03-23T08:06:00Z", "pushed_at": "2022-08-05T19:57:30Z", - "stargazers_count": 118, - "watchers_count": 118, + "stargazers_count": 119, + "watchers_count": 119, "has_discussions": false, - "forks_count": 22, + "forks_count": 23, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -147,8 +147,8 @@ "exploit" ], "visibility": "public", - "forks": 22, - "watchers": 118, + "forks": 23, + "watchers": 119, "score": 0, "subscribers_count": 2 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index d3307595f5..bd3ff410fa 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -907,10 +907,10 @@ "description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ", "fork": false, "created_at": "2021-12-10T23:19:28Z", - "updated_at": "2024-03-22T10:34:44Z", + "updated_at": "2024-03-23T09:33:21Z", "pushed_at": "2024-02-12T22:37:25Z", - "stargazers_count": 1727, - "watchers_count": 1727, + "stargazers_count": 1728, + "watchers_count": 1728, "has_discussions": false, "forks_count": 516, "allow_forking": true, @@ -924,7 +924,7 @@ ], "visibility": "public", "forks": 516, - "watchers": 1727, + "watchers": 1728, "score": 0, "subscribers_count": 28 }, @@ -12533,13 +12533,13 @@ "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 0 diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index d52f82b5a9..a9b4d03c97 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -1185,10 +1185,10 @@ "description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.", "fork": false, "created_at": "2022-03-12T20:57:24Z", - "updated_at": "2024-03-21T08:10:31Z", + "updated_at": "2024-03-23T07:58:01Z", "pushed_at": "2023-05-20T05:55:45Z", - "stargazers_count": 495, - "watchers_count": 495, + "stargazers_count": 496, + "watchers_count": 496, "has_discussions": false, "forks_count": 134, "allow_forking": true, @@ -1197,7 +1197,7 @@ "topics": [], "visibility": "public", "forks": 134, - "watchers": 495, + "watchers": 496, "score": 0, "subscribers_count": 15 }, diff --git a/2022/CVE-2022-1386.json b/2022/CVE-2022-1386.json index 873d98a8d7..8963de971f 100644 --- a/2022/CVE-2022-1386.json +++ b/2022/CVE-2022-1386.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2023-02-28T02:08:59Z", - "updated_at": "2024-03-07T19:41:19Z", + "updated_at": "2024-03-23T10:03:02Z", "pushed_at": "2023-03-09T16:25:57Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 8, + "watchers": 7, "score": 0, "subscribers_count": 1 }, diff --git a/2022/CVE-2022-1388.json b/2022/CVE-2022-1388.json index bb99fe443a..a84abcddfc 100644 --- a/2022/CVE-2022-1388.json +++ b/2022/CVE-2022-1388.json @@ -380,10 +380,10 @@ "description": "Exploit and Check Script for CVE 2022-1388", "fork": false, "created_at": "2022-05-09T11:30:09Z", - "updated_at": "2024-02-16T05:41:36Z", + "updated_at": "2024-03-23T09:30:02Z", "pushed_at": "2022-05-26T23:51:01Z", - "stargazers_count": 58, - "watchers_count": 58, + "stargazers_count": 57, + "watchers_count": 57, "has_discussions": false, "forks_count": 31, "allow_forking": true, @@ -392,7 +392,7 @@ "topics": [], "visibility": "public", "forks": 31, - "watchers": 58, + "watchers": 57, "score": 0, "subscribers_count": 3 }, @@ -410,19 +410,19 @@ "description": "POC for CVE-2022-1388", "fork": false, "created_at": "2022-05-09T11:46:45Z", - "updated_at": "2024-03-09T16:24:09Z", + "updated_at": "2024-03-23T11:48:53Z", "pushed_at": "2022-05-09T20:52:07Z", - "stargazers_count": 233, - "watchers_count": 233, + "stargazers_count": 234, + "watchers_count": 234, "has_discussions": false, - "forks_count": 42, + "forks_count": 41, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 42, - "watchers": 233, + "forks": 41, + "watchers": 234, "score": 0, "subscribers_count": 6 }, @@ -1036,10 +1036,10 @@ "description": "CVE-2022-1388 Scanner", "fork": false, "created_at": "2022-05-11T19:33:37Z", - "updated_at": "2023-01-26T20:22:15Z", + "updated_at": "2024-03-23T10:55:01Z", "pushed_at": "2023-01-22T02:08:58Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -1048,7 +1048,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 }, @@ -1916,19 +1916,19 @@ "description": "PoC for CVE-2022-1388 affecting F5 BIG-IP.", "fork": false, "created_at": "2024-01-09T19:52:36Z", - "updated_at": "2024-01-09T20:13:12Z", + "updated_at": "2024-03-23T10:44:09Z", "pushed_at": "2024-01-12T22:42:14Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, - "watchers": 0, + "forks": 1, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2022/CVE-2022-38694.json b/2022/CVE-2022-38694.json index 1c27533eaf..a0f68f46dc 100644 --- a/2022/CVE-2022-38694.json +++ b/2022/CVE-2022-38694.json @@ -13,10 +13,10 @@ "description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692", "fork": false, "created_at": "2023-06-10T08:31:26Z", - "updated_at": "2024-03-20T15:37:22Z", + "updated_at": "2024-03-23T07:51:01Z", "pushed_at": "2024-02-23T14:48:26Z", - "stargazers_count": 181, - "watchers_count": 181, + "stargazers_count": 182, + "watchers_count": 182, "has_discussions": true, "forks_count": 23, "allow_forking": true, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 23, - "watchers": 181, + "watchers": 182, "score": 0, "subscribers_count": 7 } diff --git a/2022/CVE-2022-41040.json b/2022/CVE-2022-41040.json index 24678a5da4..db953101c1 100644 --- a/2022/CVE-2022-41040.json +++ b/2022/CVE-2022-41040.json @@ -138,7 +138,7 @@ "stargazers_count": 88, "watchers_count": 88, "has_discussions": false, - "forks_count": 12, + "forks_count": 13, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -156,7 +156,7 @@ "ssrf" ], "visibility": "public", - "forks": 12, + "forks": 13, "watchers": 88, "score": 0, "subscribers_count": 2 diff --git a/2023/CVE-2023-22515.json b/2023/CVE-2023-22515.json index 2a83fdcaae..4d3a2d9b78 100644 --- a/2023/CVE-2023-22515.json +++ b/2023/CVE-2023-22515.json @@ -142,10 +142,10 @@ "description": "CVE-2023-22515 - Broken Access Control Vulnerability in Confluence Data Center and Server", "fork": false, "created_at": "2023-10-11T11:21:47Z", - "updated_at": "2024-02-07T08:37:21Z", + "updated_at": "2024-03-23T07:01:04Z", "pushed_at": "2023-10-13T15:31:13Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -166,7 +166,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-32784.json b/2023/CVE-2023-32784.json index c354510d98..5260096dab 100644 --- a/2023/CVE-2023-32784.json +++ b/2023/CVE-2023-32784.json @@ -13,10 +13,10 @@ "description": "Original PoC for CVE-2023-32784", "fork": false, "created_at": "2023-05-01T17:08:55Z", - "updated_at": "2024-03-18T11:13:00Z", + "updated_at": "2024-03-23T11:15:48Z", "pushed_at": "2023-08-17T19:26:55Z", - "stargazers_count": 618, - "watchers_count": 618, + "stargazers_count": 619, + "watchers_count": 619, "has_discussions": false, "forks_count": 55, "allow_forking": true, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 55, - "watchers": 618, + "watchers": 619, "score": 0, "subscribers_count": 10 }, diff --git a/2023/CVE-2023-33580.json b/2023/CVE-2023-33580.json new file mode 100644 index 0000000000..a3a5d13e2e --- /dev/null +++ b/2023/CVE-2023-33580.json @@ -0,0 +1,40 @@ +[ + { + "id": 649283835, + "name": "My-CVE", + "full_name": "sudovivek\/My-CVE", + "owner": { + "login": "sudovivek", + "id": 132650634, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/132650634?v=4", + "html_url": "https:\/\/github.com\/sudovivek" + }, + "html_url": "https:\/\/github.com\/sudovivek\/My-CVE", + "description": "Explore CVE-2023-33580 (XSS) & CVE-2023-33584 (SQLI) discovered by me. Dive into vulnerabilities and exploits for insights.", + "fork": false, + "created_at": "2023-06-04T11:27:20Z", + "updated_at": "2024-03-23T06:34:16Z", + "pushed_at": "2024-03-23T06:27:22Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "cve", + "cve-2023-33580", + "cve-2023-33584", + "exploit", + "mitre", + "sqli", + "xss" + ], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-3519.json b/2023/CVE-2023-3519.json index bd1ba0abfb..a8fc4f6d0a 100644 --- a/2023/CVE-2023-3519.json +++ b/2023/CVE-2023-3519.json @@ -352,10 +352,10 @@ "description": "Citrix ADC RCE CVE-2023-3519", "fork": false, "created_at": "2023-08-24T12:24:24Z", - "updated_at": "2023-12-19T11:40:11Z", + "updated_at": "2024-03-23T09:21:09Z", "pushed_at": "2023-08-30T15:47:22Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -364,7 +364,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-36424.json b/2023/CVE-2023-36424.json index 6b916e8d64..7c05fbb0fb 100644 --- a/2023/CVE-2023-36424.json +++ b/2023/CVE-2023-36424.json @@ -13,19 +13,19 @@ "description": "Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation", "fork": false, "created_at": "2024-03-21T21:39:24Z", - "updated_at": "2024-03-23T02:25:17Z", + "updated_at": "2024-03-23T11:18:27Z", "pushed_at": "2024-03-22T06:45:43Z", - "stargazers_count": 44, - "watchers_count": 44, + "stargazers_count": 45, + "watchers_count": 45, "has_discussions": false, - "forks_count": 15, + "forks_count": 16, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 15, - "watchers": 44, + "forks": 16, + "watchers": 45, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-38646.json b/2023/CVE-2023-38646.json index 9cd4725245..eacc833b0c 100644 --- a/2023/CVE-2023-38646.json +++ b/2023/CVE-2023-38646.json @@ -393,10 +393,10 @@ "description": "Metabase Pre-auth RCE (CVE-2023-38646)", "fork": false, "created_at": "2023-08-19T11:47:08Z", - "updated_at": "2023-12-10T21:28:59Z", + "updated_at": "2024-03-23T07:01:23Z", "pushed_at": "2023-08-19T12:18:45Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -420,7 +420,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 6, + "watchers": 7, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-46747.json b/2023/CVE-2023-46747.json index 54177fb854..3c8315ae6c 100644 --- a/2023/CVE-2023-46747.json +++ b/2023/CVE-2023-46747.json @@ -43,12 +43,12 @@ "description": "exploit for f5-big-ip RCE cve-2023-46747", "fork": false, "created_at": "2023-11-01T09:31:05Z", - "updated_at": "2024-03-22T07:00:04Z", + "updated_at": "2024-03-23T12:18:20Z", "pushed_at": "2024-01-20T02:27:51Z", - "stargazers_count": 171, - "watchers_count": 171, + "stargazers_count": 173, + "watchers_count": 173, "has_discussions": false, - "forks_count": 44, + "forks_count": 45, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -60,8 +60,8 @@ "redteam" ], "visibility": "public", - "forks": 44, - "watchers": 171, + "forks": 45, + "watchers": 173, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-46805.json b/2023/CVE-2023-46805.json index 8aa5428041..b8c9c4a411 100644 --- a/2023/CVE-2023-46805.json +++ b/2023/CVE-2023-46805.json @@ -93,36 +93,6 @@ "score": 0, "subscribers_count": 2 }, - { - "id": 744452699, - "name": "Check-Vulns-Script", - "full_name": "TheRedDevil1\/Check-Vulns-Script", - "owner": { - "login": "TheRedDevil1", - "id": 156904848, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/156904848?v=4", - "html_url": "https:\/\/github.com\/TheRedDevil1" - }, - "html_url": "https:\/\/github.com\/TheRedDevil1\/Check-Vulns-Script", - "description": "Here is a script to check vulns CVE-2023-46805 and CVE-2024-21887", - "fork": false, - "created_at": "2024-01-17T10:29:02Z", - "updated_at": "2024-03-18T04:20:06Z", - "pushed_at": "2024-01-17T10:35:15Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 4, - "score": 0, - "subscribers_count": 1 - }, { "id": 745015590, "name": "CVE-2023-46805_CVE-2024-21887", diff --git a/2023/CVE-2023-48788.json b/2023/CVE-2023-48788.json index 7751734f72..1359ccfde3 100644 --- a/2023/CVE-2023-48788.json +++ b/2023/CVE-2023-48788.json @@ -1,34 +1,4 @@ [ - { - "id": 773611669, - "name": "CVE-2023-48788", - "full_name": "TheRedDevil1\/CVE-2023-48788", - "owner": { - "login": "TheRedDevil1", - "id": 156904848, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/156904848?v=4", - "html_url": "https:\/\/github.com\/TheRedDevil1" - }, - "html_url": "https:\/\/github.com\/TheRedDevil1\/CVE-2023-48788", - "description": "CVE-2023-48788 is a SQLi vulnerability which leads to unauthenticated remote code executing in fortinet's FortiClientEMS.", - "fork": false, - "created_at": "2024-03-18T04:25:48Z", - "updated_at": "2024-03-22T23:34:47Z", - "pushed_at": "2024-03-18T04:38:24Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, { "id": 774039594, "name": "CVE-2023-48788", @@ -58,35 +28,5 @@ "watchers": 15, "score": 0, "subscribers_count": 4 - }, - { - "id": 776211113, - "name": "CVE-2023-48788-exploit", - "full_name": "TheRedDevil1\/CVE-2023-48788-exploit", - "owner": { - "login": "TheRedDevil1", - "id": 156904848, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/156904848?v=4", - "html_url": "https:\/\/github.com\/TheRedDevil1" - }, - "html_url": "https:\/\/github.com\/TheRedDevil1\/CVE-2023-48788-exploit", - "description": "A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiClientEMS version 7.2.0 through 7.2.2, FortiClientEMS 7.0.1 through 7.0.10 allows attacker to execute unauthorized code or commands via specially crafted packets.", - "fork": false, - "created_at": "2024-03-22T22:53:50Z", - "updated_at": "2024-03-22T23:34:49Z", - "pushed_at": "2024-03-22T22:58:06Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-7028.json b/2023/CVE-2023-7028.json index b6c672bbe9..316887d401 100644 --- a/2023/CVE-2023-7028.json +++ b/2023/CVE-2023-7028.json @@ -185,36 +185,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 745917291, - "name": "CVE-2023-7028", - "full_name": "TheRedDevil1\/CVE-2023-7028", - "owner": { - "login": "TheRedDevil1", - "id": 156904848, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/156904848?v=4", - "html_url": "https:\/\/github.com\/TheRedDevil1" - }, - "html_url": "https:\/\/github.com\/TheRedDevil1\/CVE-2023-7028", - "description": "Exploit of account take-over in Gitlab", - "fork": false, - "created_at": "2024-01-20T14:44:14Z", - "updated_at": "2024-03-18T04:20:06Z", - "pushed_at": "2024-01-20T14:46:12Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, { "id": 747135442, "name": "CVE-2023-7028-Account-Take-Over-Gitlab", diff --git a/2024/CVE-2024-21633.json b/2024/CVE-2024-21633.json index 1260d7e20c..8aa57f309e 100644 --- a/2024/CVE-2024-21633.json +++ b/2024/CVE-2024-21633.json @@ -13,10 +13,10 @@ "description": "MobSF Remote code execution (via CVE-2024-21633)", "fork": false, "created_at": "2024-01-07T21:34:09Z", - "updated_at": "2024-03-21T17:36:45Z", + "updated_at": "2024-03-23T10:44:28Z", "pushed_at": "2024-01-07T21:34:51Z", - "stargazers_count": 67, - "watchers_count": 67, + "stargazers_count": 68, + "watchers_count": 68, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 67, + "watchers": 68, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-21762.json b/2024/CVE-2024-21762.json index 5420545d31..23f87617fb 100644 --- a/2024/CVE-2024-21762.json +++ b/2024/CVE-2024-21762.json @@ -149,66 +149,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 772797917, - "name": "CVE-2024-21762_POC", - "full_name": "vorotilovaawex\/CVE-2024-21762_POC", - "owner": { - "login": "vorotilovaawex", - "id": 154236393, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/154236393?v=4", - "html_url": "https:\/\/github.com\/vorotilovaawex" - }, - "html_url": "https:\/\/github.com\/vorotilovaawex\/CVE-2024-21762_POC", - "description": "Fortinet CVE 2024", - "fork": false, - "created_at": "2024-03-15T23:27:32Z", - "updated_at": "2024-03-18T07:57:09Z", - "pushed_at": "2024-03-15T23:30:31Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 773176691, - "name": "CVE-2024-21762", - "full_name": "TheRedDevil1\/CVE-2024-21762", - "owner": { - "login": "TheRedDevil1", - "id": 156904848, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/156904848?v=4", - "html_url": "https:\/\/github.com\/TheRedDevil1" - }, - "html_url": "https:\/\/github.com\/TheRedDevil1\/CVE-2024-21762", - "description": null, - "fork": false, - "created_at": "2024-03-17T00:04:20Z", - "updated_at": "2024-03-18T04:02:18Z", - "pushed_at": "2024-03-22T23:39:15Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, { "id": 773292574, "name": "CVE-2024-21762", diff --git a/2024/CVE-2024-21887.json b/2024/CVE-2024-21887.json index 18e6e99b60..94df8d78a1 100644 --- a/2024/CVE-2024-21887.json +++ b/2024/CVE-2024-21887.json @@ -89,36 +89,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 744452699, - "name": "Check-Vulns-Script", - "full_name": "TheRedDevil1\/Check-Vulns-Script", - "owner": { - "login": "TheRedDevil1", - "id": 156904848, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/156904848?v=4", - "html_url": "https:\/\/github.com\/TheRedDevil1" - }, - "html_url": "https:\/\/github.com\/TheRedDevil1\/Check-Vulns-Script", - "description": "Here is a script to check vulns CVE-2023-46805 and CVE-2024-21887", - "fork": false, - "created_at": "2024-01-17T10:29:02Z", - "updated_at": "2024-03-18T04:20:06Z", - "pushed_at": "2024-01-17T10:35:15Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 4, - "score": 0, - "subscribers_count": 1 - }, { "id": 745015590, "name": "CVE-2023-46805_CVE-2024-21887", diff --git a/2024/CVE-2024-23897.json b/2024/CVE-2024-23897.json index 4d377c3e43..870c537d9e 100644 --- a/2024/CVE-2024-23897.json +++ b/2024/CVE-2024-23897.json @@ -755,35 +755,5 @@ "watchers": 1, "score": 0, "subscribers_count": 1 - }, - { - "id": 773607956, - "name": "CVE-2024-23897", - "full_name": "TheRedDevil1\/CVE-2024-23897", - "owner": { - "login": "TheRedDevil1", - "id": 156904848, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/156904848?v=4", - "html_url": "https:\/\/github.com\/TheRedDevil1" - }, - "html_url": "https:\/\/github.com\/TheRedDevil1\/CVE-2024-23897", - "description": null, - "fork": false, - "created_at": "2024-03-18T04:11:14Z", - "updated_at": "2024-03-18T04:20:02Z", - "pushed_at": "2024-03-18T04:18:23Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-2432.json b/2024/CVE-2024-2432.json index 0444610a36..471fcd267d 100644 --- a/2024/CVE-2024-2432.json +++ b/2024/CVE-2024-2432.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2024-03-14T17:48:49Z", - "updated_at": "2024-03-23T01:03:06Z", + "updated_at": "2024-03-23T10:24:49Z", "pushed_at": "2024-03-14T17:49:48Z", - "stargazers_count": 36, - "watchers_count": 36, + "stargazers_count": 37, + "watchers_count": 37, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 8, - "watchers": 36, + "watchers": 37, "score": 0, "subscribers_count": 1 } diff --git a/README.md b/README.md index 0eb4957dc9..4ca471012e 100644 --- a/README.md +++ b/README.md @@ -284,8 +284,6 @@ - [cleverg0d/CVE-2024-21762-Checker](https://github.com/cleverg0d/CVE-2024-21762-Checker) - [h4x0r-dz/CVE-2024-21762](https://github.com/h4x0r-dz/CVE-2024-21762) - [r4p3c4/CVE-2024-21762-Exploit-PoC-Fortinet-SSL-VPN-Check](https://github.com/r4p3c4/CVE-2024-21762-Exploit-PoC-Fortinet-SSL-VPN-Check) -- [vorotilovaawex/CVE-2024-21762_POC](https://github.com/vorotilovaawex/CVE-2024-21762_POC) -- [TheRedDevil1/CVE-2024-21762](https://github.com/TheRedDevil1/CVE-2024-21762) - [d0rb/CVE-2024-21762](https://github.com/d0rb/CVE-2024-21762) ### CVE-2024-21887 (2024-01-12) @@ -296,7 +294,6 @@ - [oways/ivanti-CVE-2024-21887](https://github.com/oways/ivanti-CVE-2024-21887) - [duy-31/CVE-2023-46805_CVE-2024-21887](https://github.com/duy-31/CVE-2023-46805_CVE-2024-21887) - [Chocapikk/CVE-2024-21887](https://github.com/Chocapikk/CVE-2024-21887) -- [TheRedDevil1/Check-Vulns-Script](https://github.com/TheRedDevil1/Check-Vulns-Script) - [raminkarimkhani1996/CVE-2023-46805_CVE-2024-21887](https://github.com/raminkarimkhani1996/CVE-2023-46805_CVE-2024-21887) - [seajaysec/Ivanti-Connect-Around-Scan](https://github.com/seajaysec/Ivanti-Connect-Around-Scan) - [mickdec/CVE-2023-46805_CVE-2024-21887_scan_grouped](https://github.com/mickdec/CVE-2023-46805_CVE-2024-21887_scan_grouped) @@ -568,7 +565,6 @@ - [pulentoski/CVE-2024-23897-Arbitrary-file-read](https://github.com/pulentoski/CVE-2024-23897-Arbitrary-file-read) - [Nebian/CVE-2024-23897](https://github.com/Nebian/CVE-2024-23897) - [Abo5/CVE-2024-23897](https://github.com/Abo5/CVE-2024-23897) -- [TheRedDevil1/CVE-2024-23897](https://github.com/TheRedDevil1/CVE-2024-23897) ### CVE-2024-24034 (2024-02-08) @@ -2222,7 +2218,6 @@ - [Vozec/CVE-2023-7028](https://github.com/Vozec/CVE-2023-7028) - [yoryio/CVE-2023-7028](https://github.com/yoryio/CVE-2023-7028) - [Esonhugh/gitlab_honeypot](https://github.com/Esonhugh/gitlab_honeypot) -- [TheRedDevil1/CVE-2023-7028](https://github.com/TheRedDevil1/CVE-2023-7028) - [Shimon03/CVE-2023-7028-Account-Take-Over-Gitlab](https://github.com/Shimon03/CVE-2023-7028-Account-Take-Over-Gitlab) - [thanhlam-attt/CVE-2023-7028](https://github.com/thanhlam-attt/CVE-2023-7028) - [Trackflaw/CVE-2023-7028-Docker](https://github.com/Trackflaw/CVE-2023-7028-Docker) @@ -4686,6 +4681,13 @@ - [wushigudan/CVE-2023-33517](https://github.com/wushigudan/CVE-2023-33517) +### CVE-2023-33580 (2023-06-26) + +Phpgurukul Student Study Center Management System V1.0 is vulnerable to Cross Site Scripting (XSS) in the "Admin Name" field on Admin Profile page. + + +- [sudovivek/My-CVE](https://github.com/sudovivek/My-CVE) + ### CVE-2023-33592 (2023-06-28) Lost and Found Information System v1.0 was discovered to contain a SQL injection vulnerability via the component /php-lfis/admin/?page=system_info/contact_information. @@ -7315,7 +7317,6 @@ - [yoryio/CVE-2023-46805](https://github.com/yoryio/CVE-2023-46805) - [cbeek-r7/CVE-2023-46805](https://github.com/cbeek-r7/CVE-2023-46805) - [duy-31/CVE-2023-46805_CVE-2024-21887](https://github.com/duy-31/CVE-2023-46805_CVE-2024-21887) -- [TheRedDevil1/Check-Vulns-Script](https://github.com/TheRedDevil1/Check-Vulns-Script) - [raminkarimkhani1996/CVE-2023-46805_CVE-2024-21887](https://github.com/raminkarimkhani1996/CVE-2023-46805_CVE-2024-21887) - [seajaysec/Ivanti-Connect-Around-Scan](https://github.com/seajaysec/Ivanti-Connect-Around-Scan) - [Chocapikk/CVE-2023-46805](https://github.com/Chocapikk/CVE-2023-46805) @@ -7613,9 +7614,7 @@ - [AkuCyberSec/Elementor-3.18.0-Upload-Path-Traversal-RCE-CVE-2023-48777](https://github.com/AkuCyberSec/Elementor-3.18.0-Upload-Path-Traversal-RCE-CVE-2023-48777) ### CVE-2023-48788 -- [TheRedDevil1/CVE-2023-48788](https://github.com/TheRedDevil1/CVE-2023-48788) - [horizon3ai/CVE-2023-48788](https://github.com/horizon3ai/CVE-2023-48788) -- [TheRedDevil1/CVE-2023-48788-exploit](https://github.com/TheRedDevil1/CVE-2023-48788-exploit) ### CVE-2023-48842 (2023-12-01)