diff --git a/2014/CVE-2014-0282.json b/2014/CVE-2014-0282.json index 527751c2f6..527970b17a 100644 --- a/2014/CVE-2014-0282.json +++ b/2014/CVE-2014-0282.json @@ -13,10 +13,10 @@ "description": "PoC - Exploit Delivery via Steganography and Polyglots, CVE-2014-0282", "fork": false, "created_at": "2021-05-17T04:39:32Z", - "updated_at": "2023-09-28T11:27:44Z", + "updated_at": "2023-10-14T00:54:03Z", "pushed_at": "2023-09-05T12:25:25Z", - "stargazers_count": 30, - "watchers_count": 30, + "stargazers_count": 31, + "watchers_count": 31, "has_discussions": false, "forks_count": 14, "allow_forking": true, @@ -41,7 +41,7 @@ ], "visibility": "public", "forks": 14, - "watchers": 30, + "watchers": 31, "score": 0, "subscribers_count": 4 } diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 9164affbe0..1bfb425277 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -43,10 +43,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-10-11T13:44:58Z", + "updated_at": "2023-10-14T05:41:41Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1802, - "watchers_count": 1802, + "stargazers_count": 1804, + "watchers_count": 1804, "has_discussions": false, "forks_count": 335, "allow_forking": true, @@ -76,7 +76,7 @@ ], "visibility": "public", "forks": 335, - "watchers": 1802, + "watchers": 1804, "score": 0, "subscribers_count": 34 }, diff --git a/2015/CVE-2015-6639.json b/2015/CVE-2015-6639.json index f740e78295..483eb3af43 100644 --- a/2015/CVE-2015-6639.json +++ b/2015/CVE-2015-6639.json @@ -43,10 +43,10 @@ "description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431", "fork": false, "created_at": "2016-06-30T11:56:44Z", - "updated_at": "2023-09-23T04:10:20Z", + "updated_at": "2023-10-14T01:55:01Z", "pushed_at": "2016-06-30T15:32:42Z", - "stargazers_count": 329, - "watchers_count": 329, + "stargazers_count": 330, + "watchers_count": 330, "has_discussions": false, "forks_count": 123, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 123, - "watchers": 329, + "watchers": 330, "score": 0, "subscribers_count": 48 } diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 293b1379f5..74426eb14c 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-10-11T13:44:58Z", + "updated_at": "2023-10-14T05:41:41Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1802, - "watchers_count": 1802, + "stargazers_count": 1804, + "watchers_count": 1804, "has_discussions": false, "forks_count": 335, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 335, - "watchers": 1802, + "watchers": 1804, "score": 0, "subscribers_count": 34 }, diff --git a/2016/CVE-2016-2431.json b/2016/CVE-2016-2431.json index 4698f361f2..ce98ae2dda 100644 --- a/2016/CVE-2016-2431.json +++ b/2016/CVE-2016-2431.json @@ -43,10 +43,10 @@ "description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431", "fork": false, "created_at": "2016-06-30T11:56:44Z", - "updated_at": "2023-09-23T04:10:20Z", + "updated_at": "2023-10-14T01:55:01Z", "pushed_at": "2016-06-30T15:32:42Z", - "stargazers_count": 329, - "watchers_count": 329, + "stargazers_count": 330, + "watchers_count": 330, "has_discussions": false, "forks_count": 123, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 123, - "watchers": 329, + "watchers": 330, "score": 0, "subscribers_count": 48 } diff --git a/2017/CVE-2017-1000253.json b/2017/CVE-2017-1000253.json index d7078530d3..c01dab9470 100644 --- a/2017/CVE-2017-1000253.json +++ b/2017/CVE-2017-1000253.json @@ -1,4 +1,34 @@ [ + { + "id": 137769369, + "name": "PIE-Stack-Clash-CVE-2017-1000253", + "full_name": "RicterZ\/PIE-Stack-Clash-CVE-2017-1000253", + "owner": { + "login": "RicterZ", + "id": 5282759, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5282759?v=4", + "html_url": "https:\/\/github.com\/RicterZ" + }, + "html_url": "https:\/\/github.com\/RicterZ\/PIE-Stack-Clash-CVE-2017-1000253", + "description": "Demo-ing CVE-2017-1000253 in a container", + "fork": false, + "created_at": "2018-06-18T15:22:01Z", + "updated_at": "2023-06-01T08:36:39Z", + "pushed_at": "2017-11-01T07:59:24Z", + "stargazers_count": 5, + "watchers_count": 5, + "has_discussions": false, + "forks_count": 6, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 6, + "watchers": 5, + "score": 0, + "subscribers_count": 2 + }, { "id": 552591833, "name": "CVE-2017-1000253", diff --git a/2017/CVE-2017-10271.json b/2017/CVE-2017-10271.json index 62ca72bbaf..5ae5de0f93 100644 --- a/2017/CVE-2017-10271.json +++ b/2017/CVE-2017-10271.json @@ -149,6 +149,36 @@ "score": 0, "subscribers_count": 4 }, + { + "id": 116099094, + "name": "weblogic_wls_wsat_rce", + "full_name": "cjjduck\/weblogic_wls_wsat_rce", + "owner": { + "login": "cjjduck", + "id": 23519154, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23519154?v=4", + "html_url": "https:\/\/github.com\/cjjduck" + }, + "html_url": "https:\/\/github.com\/cjjduck\/weblogic_wls_wsat_rce", + "description": "forked from https:\/\/github.com\/s3xy\/CVE-2017-10271. Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.Modified by hanc00l", + "fork": false, + "created_at": "2018-01-03T06:14:28Z", + "updated_at": "2020-10-09T02:33:00Z", + "pushed_at": "2018-01-03T00:42:57Z", + "stargazers_count": 3, + "watchers_count": 3, + "has_discussions": false, + "forks_count": 40, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 40, + "watchers": 3, + "score": 0, + "subscribers_count": 0 + }, { "id": 116430643, "name": "CVE-2017-10271", diff --git a/2017/CVE-2017-16997.json b/2017/CVE-2017-16997.json new file mode 100644 index 0000000000..7f0fc060d6 --- /dev/null +++ b/2017/CVE-2017-16997.json @@ -0,0 +1,32 @@ +[ + { + "id": 116118639, + "name": "CVE-2017-16997-poc", + "full_name": "Xiami2012\/CVE-2017-16997-poc", + "owner": { + "login": "Xiami2012", + "id": 1927254, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1927254?v=4", + "html_url": "https:\/\/github.com\/Xiami2012" + }, + "html_url": "https:\/\/github.com\/Xiami2012\/CVE-2017-16997-poc", + "description": "A proof-of-concept for CVE-2017-16997", + "fork": false, + "created_at": "2018-01-03T09:31:55Z", + "updated_at": "2018-01-03T09:33:01Z", + "pushed_at": "2018-01-03T10:39:28Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 3 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-17692.json b/2017/CVE-2017-17692.json new file mode 100644 index 0000000000..e9108d9cc0 --- /dev/null +++ b/2017/CVE-2017-17692.json @@ -0,0 +1,32 @@ +[ + { + "id": 116205741, + "name": "CVE-2017-17692", + "full_name": "specloli\/CVE-2017-17692", + "owner": { + "login": "specloli", + "id": 10647366, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10647366?v=4", + "html_url": "https:\/\/github.com\/specloli" + }, + "html_url": "https:\/\/github.com\/specloli\/CVE-2017-17692", + "description": null, + "fork": false, + "created_at": "2018-01-04T02:40:13Z", + "updated_at": "2021-11-23T15:08:43Z", + "pushed_at": "2018-01-02T13:58:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 7196c3b9ee..0befa7243d 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -43,10 +43,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-10-11T13:44:58Z", + "updated_at": "2023-10-14T05:41:41Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1802, - "watchers_count": 1802, + "stargazers_count": 1804, + "watchers_count": 1804, "has_discussions": false, "forks_count": 335, "allow_forking": true, @@ -76,7 +76,7 @@ ], "visibility": "public", "forks": 335, - "watchers": 1802, + "watchers": 1804, "score": 0, "subscribers_count": 34 }, diff --git a/2017/CVE-2017-3881.json b/2017/CVE-2017-3881.json index 711172089a..c3d14dce90 100644 --- a/2017/CVE-2017-3881.json +++ b/2017/CVE-2017-3881.json @@ -118,5 +118,35 @@ "watchers": 1, "score": 0, "subscribers_count": 0 + }, + { + "id": 115962692, + "name": "CVE-2017-3881", + "full_name": "1337g\/CVE-2017-3881", + "owner": { + "login": "1337g", + "id": 32504404, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32504404?v=4", + "html_url": "https:\/\/github.com\/1337g" + }, + "html_url": "https:\/\/github.com\/1337g\/CVE-2017-3881", + "description": "credit to artkond", + "fork": false, + "created_at": "2018-01-02T01:45:15Z", + "updated_at": "2022-04-11T12:16:38Z", + "pushed_at": "2018-01-02T01:46:19Z", + "stargazers_count": 2, + "watchers_count": 2, + "has_discussions": false, + "forks_count": 2, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 2, + "watchers": 2, + "score": 0, + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2017/CVE-2017-5753.json b/2017/CVE-2017-5753.json index 8dcf5773b3..514ad2bf80 100644 --- a/2017/CVE-2017-5753.json +++ b/2017/CVE-2017-5753.json @@ -35,6 +35,96 @@ "score": 0, "subscribers_count": 41 }, + { + "id": 116268310, + "name": "Spectre-PoC", + "full_name": "EdwardOwusuAdjei\/Spectre-PoC", + "owner": { + "login": "EdwardOwusuAdjei", + "id": 16462560, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16462560?v=4", + "html_url": "https:\/\/github.com\/EdwardOwusuAdjei" + }, + "html_url": "https:\/\/github.com\/EdwardOwusuAdjei\/Spectre-PoC", + "description": "Spectre (CVE-2017-5753) (CVE-2017-5715). Not By Me. Collected from Book.", + "fork": false, + "created_at": "2018-01-04T14:20:13Z", + "updated_at": "2023-09-28T10:47:11Z", + "pushed_at": "2018-01-04T14:27:29Z", + "stargazers_count": 5, + "watchers_count": 5, + "has_discussions": false, + "forks_count": 4, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 4, + "watchers": 5, + "score": 0, + "subscribers_count": 3 + }, + { + "id": 116347505, + "name": "spectre-attack-example", + "full_name": "poilynx\/spectre-attack-example", + "owner": { + "login": "poilynx", + "id": 8926090, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8926090?v=4", + "html_url": "https:\/\/github.com\/poilynx" + }, + "html_url": "https:\/\/github.com\/poilynx\/spectre-attack-example", + "description": "2018年1月2日 (CVE-2017-5753 和 CVE-2017-5715) \"幽灵\" Spectre 漏洞利用", + "fork": false, + "created_at": "2018-01-05T05:51:34Z", + "updated_at": "2021-02-24T01:25:15Z", + "pushed_at": "2018-01-05T05:56:02Z", + "stargazers_count": 11, + "watchers_count": 11, + "has_discussions": false, + "forks_count": 7, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 7, + "watchers": 11, + "score": 0, + "subscribers_count": 0 + }, + { + "id": 116442461, + "name": "spectre-attack-demo", + "full_name": "pedrolucasoliva\/spectre-attack-demo", + "owner": { + "login": "pedrolucasoliva", + "id": 10757421, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10757421?v=4", + "html_url": "https:\/\/github.com\/pedrolucasoliva" + }, + "html_url": "https:\/\/github.com\/pedrolucasoliva\/spectre-attack-demo", + "description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)", + "fork": false, + "created_at": "2018-01-06T01:08:15Z", + "updated_at": "2018-01-15T06:12:51Z", + "pushed_at": "2018-01-06T01:09:56Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 1 + }, { "id": 116505944, "name": "spectreScope", diff --git a/2017/CVE-2017-7269.json b/2017/CVE-2017-7269.json index 07f7eab831..e0514449d4 100644 --- a/2017/CVE-2017-7269.json +++ b/2017/CVE-2017-7269.json @@ -394,6 +394,36 @@ "score": 0, "subscribers_count": 2 }, + { + "id": 201442014, + "name": "CVE-2017-7269", + "full_name": "ThanHuuTuan\/CVE-2017-7269", + "owner": { + "login": "ThanHuuTuan", + "id": 32167814, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32167814?v=4", + "html_url": "https:\/\/github.com\/ThanHuuTuan" + }, + "html_url": "https:\/\/github.com\/ThanHuuTuan\/CVE-2017-7269", + "description": null, + "fork": false, + "created_at": "2019-08-09T10:01:50Z", + "updated_at": "2019-08-09T10:01:53Z", + "pushed_at": "2017-04-04T17:20:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + }, { "id": 386542444, "name": "CVE-2017-7269", diff --git a/2017/CVE-2017-9097.json b/2017/CVE-2017-9097.json new file mode 100644 index 0000000000..1e1a04bf0f --- /dev/null +++ b/2017/CVE-2017-9097.json @@ -0,0 +1,32 @@ +[ + { + "id": 116008243, + "name": "AntiWeb_testing-Suite", + "full_name": "MDudek-ICS\/AntiWeb_testing-Suite", + "owner": { + "login": "MDudek-ICS", + "id": 31083304, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31083304?v=4", + "html_url": "https:\/\/github.com\/MDudek-ICS" + }, + "html_url": "https:\/\/github.com\/MDudek-ICS\/AntiWeb_testing-Suite", + "description": "Suite de herramientas que sacan partido del CVE-2017-9097 (+RCE)", + "fork": false, + "created_at": "2018-01-02T11:28:40Z", + "updated_at": "2023-09-28T10:47:07Z", + "pushed_at": "2017-11-21T20:19:08Z", + "stargazers_count": 4, + "watchers_count": 4, + "has_discussions": false, + "forks_count": 11, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 11, + "watchers": 4, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index ecd0318f5d..885645088d 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -587,10 +587,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-10-11T13:44:58Z", + "updated_at": "2023-10-14T05:41:41Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1802, - "watchers_count": 1802, + "stargazers_count": 1804, + "watchers_count": 1804, "has_discussions": false, "forks_count": 335, "allow_forking": true, @@ -620,7 +620,7 @@ ], "visibility": "public", "forks": 335, - "watchers": 1802, + "watchers": 1804, "score": 0, "subscribers_count": 34 }, diff --git a/2019/CVE-2019-11580.json b/2019/CVE-2019-11580.json index 00cdc63575..4518901da2 100644 --- a/2019/CVE-2019-11580.json +++ b/2019/CVE-2019-11580.json @@ -13,10 +13,10 @@ "description": "CVE-2019-11580 Atlassian Crowd and Crowd Data Center RCE", "fork": false, "created_at": "2019-07-17T07:54:38Z", - "updated_at": "2023-09-28T11:04:11Z", + "updated_at": "2023-10-14T03:31:41Z", "pushed_at": "2019-07-18T10:03:28Z", - "stargazers_count": 102, - "watchers_count": 102, + "stargazers_count": 103, + "watchers_count": 103, "has_discussions": false, "forks_count": 22, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 22, - "watchers": 102, + "watchers": 103, "score": 0, "subscribers_count": 2 }, diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 228bd4f90f..3fe063d0c3 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -43,10 +43,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2023-10-12T06:22:40Z", + "updated_at": "2023-10-14T05:13:30Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3894, - "watchers_count": 3894, + "stargazers_count": 3895, + "watchers_count": 3895, "has_discussions": false, "forks_count": 1089, "allow_forking": true, @@ -75,7 +75,7 @@ ], "visibility": "public", "forks": 1089, - "watchers": 3894, + "watchers": 3895, "score": 0, "subscribers_count": 155 }, diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 6174c568ca..1130a7704c 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -193,10 +193,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-10-11T13:44:58Z", + "updated_at": "2023-10-14T05:41:41Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1802, - "watchers_count": 1802, + "stargazers_count": 1804, + "watchers_count": 1804, "has_discussions": false, "forks_count": 335, "allow_forking": true, @@ -226,7 +226,7 @@ ], "visibility": "public", "forks": 335, - "watchers": 1802, + "watchers": 1804, "score": 0, "subscribers_count": 34 } diff --git a/2019/CVE-2019-3462.json b/2019/CVE-2019-3462.json index 15c49fa5ef..163a3ddc12 100644 --- a/2019/CVE-2019-3462.json +++ b/2019/CVE-2019-3462.json @@ -1,4 +1,34 @@ [ + { + "id": 167275161, + "name": "check_CVE-2019-3462", + "full_name": "tonejito\/check_CVE-2019-3462", + "owner": { + "login": "tonejito", + "id": 618588, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/618588?v=4", + "html_url": "https:\/\/github.com\/tonejito" + }, + "html_url": "https:\/\/github.com\/tonejito\/check_CVE-2019-3462", + "description": "Check @Debian and @Ubuntu #GNU \/ #Linux for CVE-2019-3462 in APT", + "fork": false, + "created_at": "2019-01-24T00:30:15Z", + "updated_at": "2023-09-28T10:57:49Z", + "pushed_at": "2019-01-26T01:21:36Z", + "stargazers_count": 3, + "watchers_count": 3, + "has_discussions": false, + "forks_count": 4, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 4, + "watchers": 3, + "score": 0, + "subscribers_count": 3 + }, { "id": 170573944, "name": "update-apt-package", diff --git a/2019/CVE-2019-5893.json b/2019/CVE-2019-5893.json new file mode 100644 index 0000000000..c13b59b212 --- /dev/null +++ b/2019/CVE-2019-5893.json @@ -0,0 +1,36 @@ +[ + { + "id": 165075365, + "name": "OpenSource-ERP-SQL-Injection", + "full_name": "EmreOvunc\/OpenSource-ERP-SQL-Injection", + "owner": { + "login": "EmreOvunc", + "id": 15659223, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15659223?v=4", + "html_url": "https:\/\/github.com\/EmreOvunc" + }, + "html_url": "https:\/\/github.com\/EmreOvunc\/OpenSource-ERP-SQL-Injection", + "description": "CVE-2019-5893 | OpenSource ERP application has SQL Injection vulnerability.", + "fork": false, + "created_at": "2019-01-10T14:36:55Z", + "updated_at": "2023-09-28T10:57:23Z", + "pushed_at": "2019-01-11T07:45:37Z", + "stargazers_count": 6, + "watchers_count": 6, + "has_discussions": false, + "forks_count": 4, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "cve-2019-5893", + "erp", + "sql-injection" + ], + "visibility": "public", + "forks": 4, + "watchers": 6, + "score": 0, + "subscribers_count": 2 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-6263.json b/2019/CVE-2019-6263.json new file mode 100644 index 0000000000..9fcedebf09 --- /dev/null +++ b/2019/CVE-2019-6263.json @@ -0,0 +1,32 @@ +[ + { + "id": 166368513, + "name": "CVE-2019-6263-Joomla-POC", + "full_name": "praveensutar\/CVE-2019-6263-Joomla-POC", + "owner": { + "login": "praveensutar", + "id": 12555214, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12555214?v=4", + "html_url": "https:\/\/github.com\/praveensutar" + }, + "html_url": "https:\/\/github.com\/praveensutar\/CVE-2019-6263-Joomla-POC", + "description": null, + "fork": false, + "created_at": "2019-01-18T08:10:11Z", + "updated_at": "2023-01-10T03:19:58Z", + "pushed_at": "2019-01-19T04:29:22Z", + "stargazers_count": 6, + "watchers_count": 6, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 6, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-6487.json b/2019/CVE-2019-6487.json new file mode 100644 index 0000000000..52a783e200 --- /dev/null +++ b/2019/CVE-2019-6487.json @@ -0,0 +1,32 @@ +[ + { + "id": 166241615, + "name": "TP-Link-WDR-Router-Command-injection_POC", + "full_name": "afang5472\/TP-Link-WDR-Router-Command-injection_POC", + "owner": { + "login": "afang5472", + "id": 18503100, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18503100?v=4", + "html_url": "https:\/\/github.com\/afang5472" + }, + "html_url": "https:\/\/github.com\/afang5472\/TP-Link-WDR-Router-Command-injection_POC", + "description": "CVE-2019-6487. A command injection vulnerability in TP-Link WDR5620 Series up to verion 3.", + "fork": false, + "created_at": "2019-01-17T14:44:12Z", + "updated_at": "2023-09-28T10:57:36Z", + "pushed_at": "2019-01-19T10:49:21Z", + "stargazers_count": 36, + "watchers_count": 36, + "has_discussions": false, + "forks_count": 17, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 17, + "watchers": 36, + "score": 0, + "subscribers_count": 2 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 6498809852..6aa1bd5558 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,10 +13,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2023-10-12T06:22:40Z", + "updated_at": "2023-10-14T05:13:30Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3894, - "watchers_count": 3894, + "stargazers_count": 3895, + "watchers_count": 3895, "has_discussions": false, "forks_count": 1089, "allow_forking": true, @@ -45,7 +45,7 @@ ], "visibility": "public", "forks": 1089, - "watchers": 3894, + "watchers": 3895, "score": 0, "subscribers_count": 155 }, diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 25c5221c11..313c8e27e4 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-10-11T13:44:58Z", + "updated_at": "2023-10-14T05:41:41Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1802, - "watchers_count": 1802, + "stargazers_count": 1804, + "watchers_count": 1804, "has_discussions": false, "forks_count": 335, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 335, - "watchers": 1802, + "watchers": 1804, "score": 0, "subscribers_count": 34 }, diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index 44eaa20af1..b1427e7d7b 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -301,10 +301,10 @@ "description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)", "fork": false, "created_at": "2021-07-01T23:45:58Z", - "updated_at": "2023-10-12T08:27:22Z", + "updated_at": "2023-10-14T06:14:35Z", "pushed_at": "2021-07-05T08:54:06Z", - "stargazers_count": 941, - "watchers_count": 941, + "stargazers_count": 942, + "watchers_count": 942, "has_discussions": false, "forks_count": 230, "allow_forking": true, @@ -313,7 +313,7 @@ "topics": [], "visibility": "public", "forks": 230, - "watchers": 941, + "watchers": 942, "score": 0, "subscribers_count": 26 }, diff --git a/2021/CVE-2021-1732.json b/2021/CVE-2021-1732.json index 63c575b625..0218fd689a 100644 --- a/2021/CVE-2021-1732.json +++ b/2021/CVE-2021-1732.json @@ -18,13 +18,13 @@ "stargazers_count": 406, "watchers_count": 406, "has_discussions": false, - "forks_count": 126, + "forks_count": 127, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 126, + "forks": 127, "watchers": 406, "score": 0, "subscribers_count": 6 diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index 6a17a8086e..aaf49e46b8 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -851,10 +851,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2023-10-13T08:35:22Z", + "updated_at": "2023-10-14T05:20:28Z", "pushed_at": "2023-10-10T05:38:02Z", - "stargazers_count": 1115, - "watchers_count": 1115, + "stargazers_count": 1116, + "watchers_count": 1116, "has_discussions": false, "forks_count": 143, "allow_forking": true, @@ -870,7 +870,7 @@ ], "visibility": "public", "forks": 143, - "watchers": 1115, + "watchers": 1116, "score": 0, "subscribers_count": 11 } diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index b365c75e85..e98a8a10b9 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -470,10 +470,10 @@ "description": null, "fork": false, "created_at": "2021-01-30T20:39:58Z", - "updated_at": "2023-10-09T17:08:23Z", + "updated_at": "2023-10-14T05:50:13Z", "pushed_at": "2021-02-02T17:07:09Z", - "stargazers_count": 891, - "watchers_count": 891, + "stargazers_count": 892, + "watchers_count": 892, "has_discussions": false, "forks_count": 241, "allow_forking": true, @@ -482,7 +482,7 @@ "topics": [], "visibility": "public", "forks": 241, - "watchers": 891, + "watchers": 892, "score": 0, "subscribers_count": 27 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index c2eaa8b843..09663fbd0a 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -369,12 +369,12 @@ "description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).", "fork": false, "created_at": "2021-12-10T12:38:20Z", - "updated_at": "2023-10-13T12:11:31Z", + "updated_at": "2023-10-14T00:42:29Z", "pushed_at": "2023-05-11T11:29:46Z", - "stargazers_count": 1071, - "watchers_count": 1071, + "stargazers_count": 1072, + "watchers_count": 1072, "has_discussions": false, - "forks_count": 509, + "forks_count": 510, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -382,8 +382,8 @@ "log4shell" ], "visibility": "public", - "forks": 509, - "watchers": 1071, + "forks": 510, + "watchers": 1072, "score": 0, "subscribers_count": 23 }, @@ -1527,7 +1527,7 @@ "fork": false, "created_at": "2021-12-11T12:16:45Z", "updated_at": "2023-05-28T11:06:10Z", - "pushed_at": "2023-10-12T18:07:22Z", + "pushed_at": "2023-10-14T00:43:48Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, diff --git a/2022/CVE-2022-1802.json b/2022/CVE-2022-1802.json index d8f41bf851..7df945064f 100644 --- a/2022/CVE-2022-1802.json +++ b/2022/CVE-2022-1802.json @@ -27,6 +27,6 @@ "forks": 30, "watchers": 148, "score": 0, - "subscribers_count": 10 + "subscribers_count": 11 } ] \ No newline at end of file diff --git a/2022/CVE-2022-1972.json b/2022/CVE-2022-1972.json index d625cc9390..884d7fa760 100644 --- a/2022/CVE-2022-1972.json +++ b/2022/CVE-2022-1972.json @@ -27,6 +27,6 @@ "forks": 7, "watchers": 20, "score": 0, - "subscribers_count": 4 + "subscribers_count": 5 } ] \ No newline at end of file diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json index f7c6273d5d..8799916363 100644 --- a/2022/CVE-2022-22954.json +++ b/2022/CVE-2022-22954.json @@ -766,10 +766,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2023-10-13T08:35:22Z", + "updated_at": "2023-10-14T05:20:28Z", "pushed_at": "2023-10-10T05:38:02Z", - "stargazers_count": 1115, - "watchers_count": 1115, + "stargazers_count": 1116, + "watchers_count": 1116, "has_discussions": false, "forks_count": 143, "allow_forking": true, @@ -785,7 +785,7 @@ ], "visibility": "public", "forks": 143, - "watchers": 1115, + "watchers": 1116, "score": 0, "subscribers_count": 11 }, diff --git a/2022/CVE-2022-26485.json b/2022/CVE-2022-26485.json index 0e5c344da2..764cc6f501 100644 --- a/2022/CVE-2022-26485.json +++ b/2022/CVE-2022-26485.json @@ -27,6 +27,6 @@ "forks": 10, "watchers": 17, "score": 0, - "subscribers_count": 4 + "subscribers_count": 5 } ] \ No newline at end of file diff --git a/2022/CVE-2022-34918.json b/2022/CVE-2022-34918.json index 93695302df..5781090283 100644 --- a/2022/CVE-2022-34918.json +++ b/2022/CVE-2022-34918.json @@ -27,7 +27,7 @@ "forks": 35, "watchers": 241, "score": 0, - "subscribers_count": 12 + "subscribers_count": 13 }, { "id": 517351313, diff --git a/2022/CVE-2022-36804.json b/2022/CVE-2022-36804.json index 6997a62dd2..7f589431de 100644 --- a/2022/CVE-2022-36804.json +++ b/2022/CVE-2022-36804.json @@ -103,10 +103,10 @@ "description": "Somewhat Reliable PoC Exploit for CVE-2022-36804 (BitBucket Critical Command Injection)", "fork": false, "created_at": "2022-09-20T02:35:53Z", - "updated_at": "2023-05-28T03:24:15Z", + "updated_at": "2023-10-14T03:31:30Z", "pushed_at": "2022-09-24T20:52:18Z", - "stargazers_count": 14, - "watchers_count": 14, + "stargazers_count": 15, + "watchers_count": 15, "has_discussions": false, "forks_count": 10, "allow_forking": true, @@ -115,7 +115,7 @@ "topics": [], "visibility": "public", "forks": 10, - "watchers": 14, + "watchers": 15, "score": 0, "subscribers_count": 1 }, diff --git a/2022/CVE-2022-38694.json b/2022/CVE-2022-38694.json index b74e9f1b57..d8de5d8893 100644 --- a/2022/CVE-2022-38694.json +++ b/2022/CVE-2022-38694.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2023-06-10T08:31:26Z", "updated_at": "2023-10-13T13:44:32Z", - "pushed_at": "2023-10-08T13:43:56Z", + "pushed_at": "2023-10-14T06:10:44Z", "stargazers_count": 102, "watchers_count": 102, "has_discussions": false, diff --git a/2022/CVE-2022-4262.json b/2022/CVE-2022-4262.json index 550b8c5641..e751056973 100644 --- a/2022/CVE-2022-4262.json +++ b/2022/CVE-2022-4262.json @@ -27,6 +27,6 @@ "forks": 4, "watchers": 23, "score": 0, - "subscribers_count": 1 + "subscribers_count": 2 } ] \ No newline at end of file diff --git a/2022/CVE-2022-44268.json b/2022/CVE-2022-44268.json index a3fd7592ea..56fcd04fe1 100644 --- a/2022/CVE-2022-44268.json +++ b/2022/CVE-2022-44268.json @@ -654,6 +654,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-1454.json b/2023/CVE-2023-1454.json index a736381044..195b84e1e4 100644 --- a/2023/CVE-2023-1454.json +++ b/2023/CVE-2023-1454.json @@ -163,10 +163,10 @@ "description": "jmreport\/qurestSql 未授权SQL注入批量扫描poc Jeecg-Boot是一款基于Spring Boot和Jeecg-Boot-Plus的快速开发平台,最新的jeecg-boot 3.5.0 中被爆出多个SQL注入漏洞。", "fork": false, "created_at": "2023-06-20T08:12:49Z", - "updated_at": "2023-09-04T01:39:58Z", + "updated_at": "2023-10-14T02:17:17Z", "pushed_at": "2023-06-20T08:51:47Z", - "stargazers_count": 18, - "watchers_count": 18, + "stargazers_count": 19, + "watchers_count": 19, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -175,7 +175,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 18, + "watchers": 19, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-2033.json b/2023/CVE-2023-2033.json index 29b764d5e2..385014185d 100644 --- a/2023/CVE-2023-2033.json +++ b/2023/CVE-2023-2033.json @@ -152,7 +152,7 @@ "forks": 14, "watchers": 49, "score": 0, - "subscribers_count": 5 + "subscribers_count": 6 }, { "id": 679512175, diff --git a/2023/CVE-2023-21746.json b/2023/CVE-2023-21746.json index a8c83d735f..78e34830f7 100644 --- a/2023/CVE-2023-21746.json +++ b/2023/CVE-2023-21746.json @@ -13,19 +13,19 @@ "description": null, "fork": false, "created_at": "2023-07-16T15:57:37Z", - "updated_at": "2023-07-16T16:05:40Z", + "updated_at": "2023-10-14T04:56:23Z", "pushed_at": "2023-07-16T16:05:35Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, - "watchers": 0, + "forks": 1, + "watchers": 1, "score": 0, "subscribers_count": 2 } diff --git a/2023/CVE-2023-22515.json b/2023/CVE-2023-22515.json index 9a4bf0c8c5..bd0c397c9c 100644 --- a/2023/CVE-2023-22515.json +++ b/2023/CVE-2023-22515.json @@ -73,10 +73,10 @@ "description": "CVE-2023-22515: Confluence Broken Access Control Exploit", "fork": false, "created_at": "2023-10-10T21:40:09Z", - "updated_at": "2023-10-13T22:50:51Z", + "updated_at": "2023-10-14T01:57:58Z", "pushed_at": "2023-10-11T18:07:05Z", - "stargazers_count": 40, - "watchers_count": 40, + "stargazers_count": 41, + "watchers_count": 41, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -94,7 +94,7 @@ ], "visibility": "public", "forks": 9, - "watchers": 40, + "watchers": 41, "score": 0, "subscribers_count": 1 }, @@ -112,10 +112,10 @@ "description": "Confluence未授权添加管理员用户(CVE-2023-22515)漏洞利用工具", "fork": false, "created_at": "2023-10-11T08:42:17Z", - "updated_at": "2023-10-13T17:26:20Z", + "updated_at": "2023-10-14T06:25:08Z", "pushed_at": "2023-10-12T02:21:47Z", - "stargazers_count": 41, - "watchers_count": 41, + "stargazers_count": 44, + "watchers_count": 44, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -124,9 +124,9 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 41, + "watchers": 44, "score": 0, - "subscribers_count": 1 + "subscribers_count": 2 }, { "id": 703506378, @@ -214,10 +214,10 @@ "description": "Confluence Data Center & Server 权限提升漏洞 Exploit", "fork": false, "created_at": "2023-10-13T05:18:54Z", - "updated_at": "2023-10-13T11:50:03Z", + "updated_at": "2023-10-14T05:29:44Z", "pushed_at": "2023-10-13T05:21:37Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -226,9 +226,9 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 }, { "id": 704422927, @@ -258,7 +258,7 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 }, { "id": 704429158, @@ -288,6 +288,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-2640.json b/2023/CVE-2023-2640.json index 4e2c1e17c2..e8e2c61b98 100644 --- a/2023/CVE-2023-2640.json +++ b/2023/CVE-2023-2640.json @@ -113,13 +113,13 @@ "stargazers_count": 8, "watchers_count": 8, "has_discussions": false, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 2, "watchers": 8, "score": 0, "subscribers_count": 1 diff --git a/2023/CVE-2023-2868.json b/2023/CVE-2023-2868.json index 762bbd905d..377229903f 100644 --- a/2023/CVE-2023-2868.json +++ b/2023/CVE-2023-2868.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2023-06-20T18:43:54Z", - "updated_at": "2023-09-05T20:17:07Z", + "updated_at": "2023-10-14T03:31:25Z", "pushed_at": "2023-07-05T20:02:55Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 7, + "watchers": 8, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-3079.json b/2023/CVE-2023-3079.json index dec164b1be..992ed263d4 100644 --- a/2023/CVE-2023-3079.json +++ b/2023/CVE-2023-3079.json @@ -27,6 +27,6 @@ "forks": 23, "watchers": 88, "score": 0, - "subscribers_count": 4 + "subscribers_count": 5 } ] \ No newline at end of file diff --git a/2023/CVE-2023-30861.json b/2023/CVE-2023-30861.json index 5b2648c68d..e823621585 100644 --- a/2023/CVE-2023-30861.json +++ b/2023/CVE-2023-30861.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 1, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-36723.json b/2023/CVE-2023-36723.json index 9489bead90..cdb812979f 100644 --- a/2023/CVE-2023-36723.json +++ b/2023/CVE-2023-36723.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2023-09-28T21:20:23Z", - "updated_at": "2023-10-13T18:08:01Z", + "updated_at": "2023-10-14T02:56:48Z", "pushed_at": "2023-10-10T17:29:32Z", - "stargazers_count": 47, - "watchers_count": 47, + "stargazers_count": 48, + "watchers_count": 48, "has_discussions": false, "forks_count": 10, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 10, - "watchers": 47, + "watchers": 48, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-36802.json b/2023/CVE-2023-36802.json index c03bbfc172..3dd81a74bd 100644 --- a/2023/CVE-2023-36802.json +++ b/2023/CVE-2023-36802.json @@ -13,20 +13,20 @@ "description": "LPE exploit for CVE-2023-36802", "fork": false, "created_at": "2023-10-09T17:32:15Z", - "updated_at": "2023-10-14T00:07:39Z", + "updated_at": "2023-10-14T05:37:08Z", "pushed_at": "2023-10-10T17:44:17Z", - "stargazers_count": 83, - "watchers_count": 83, + "stargazers_count": 85, + "watchers_count": 85, "has_discussions": false, - "forks_count": 24, + "forks_count": 25, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 24, - "watchers": 83, + "forks": 25, + "watchers": 85, "score": 0, - "subscribers_count": 2 + "subscribers_count": 4 } ] \ No newline at end of file diff --git a/2023/CVE-2023-3710.json b/2023/CVE-2023-3710.json index becfca1e7f..6af69e0d71 100644 --- a/2023/CVE-2023-3710.json +++ b/2023/CVE-2023-3710.json @@ -31,6 +31,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-3711.json b/2023/CVE-2023-3711.json index 0fe3afb12e..060a05548c 100644 --- a/2023/CVE-2023-3711.json +++ b/2023/CVE-2023-3711.json @@ -31,6 +31,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-3712.json b/2023/CVE-2023-3712.json index 1588fdb9b5..8da43f0549 100644 --- a/2023/CVE-2023-3712.json +++ b/2023/CVE-2023-3712.json @@ -31,6 +31,6 @@ "forks": 0, "watchers": 2, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-38146.json b/2023/CVE-2023-38146.json index 617946fb9e..22d5e31da7 100644 --- a/2023/CVE-2023-38146.json +++ b/2023/CVE-2023-38146.json @@ -57,6 +57,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-38545.json b/2023/CVE-2023-38545.json index 28b52869ee..89e7b13848 100644 --- a/2023/CVE-2023-38545.json +++ b/2023/CVE-2023-38545.json @@ -13,19 +13,19 @@ "description": "Simple PoC causing overflow", "fork": false, "created_at": "2023-10-11T08:11:56Z", - "updated_at": "2023-10-12T14:33:51Z", + "updated_at": "2023-10-14T06:19:32Z", "pushed_at": "2023-10-11T08:17:06Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 12, + "watchers_count": 12, "has_discussions": false, - "forks_count": 2, + "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 2, - "watchers": 11, + "forks": 3, + "watchers": 12, "score": 0, "subscribers_count": 1 }, @@ -43,10 +43,10 @@ "description": "😄 CVE-2023-38545堆溢出的POC和分析文章", "fork": false, "created_at": "2023-10-12T07:16:49Z", - "updated_at": "2023-10-13T12:58:32Z", + "updated_at": "2023-10-14T06:23:19Z", "pushed_at": "2023-10-12T08:46:50Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 }, @@ -73,19 +73,19 @@ "description": "Simple PoC causing overflow", "fork": false, "created_at": "2023-10-12T07:39:15Z", - "updated_at": "2023-10-13T13:57:35Z", + "updated_at": "2023-10-14T06:19:49Z", "pushed_at": "2023-10-12T08:09:01Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, - "forks_count": 2, + "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 2, - "watchers": 3, + "forks": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-38646.json b/2023/CVE-2023-38646.json index 4e427724fd..6db0d8ccda 100644 --- a/2023/CVE-2023-38646.json +++ b/2023/CVE-2023-38646.json @@ -528,7 +528,7 @@ "description": "CVE-2023-38646 Metabase RCE", "fork": false, "created_at": "2023-10-11T03:18:09Z", - "updated_at": "2023-10-13T06:54:54Z", + "updated_at": "2023-10-14T04:57:01Z", "pushed_at": "2023-10-11T04:06:43Z", "stargazers_count": 12, "watchers_count": 12, @@ -547,7 +547,7 @@ "forks": 1, "watchers": 12, "score": 0, - "subscribers_count": 1 + "subscribers_count": 2 }, { "id": 703617395, diff --git a/2023/CVE-2023-43144.json b/2023/CVE-2023-43144.json index 4b0d86e8b4..dac7939fe7 100644 --- a/2023/CVE-2023-43144.json +++ b/2023/CVE-2023-43144.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-43804.json b/2023/CVE-2023-43804.json index 88dad172b1..e27d9dbecb 100644 --- a/2023/CVE-2023-43804.json +++ b/2023/CVE-2023-43804.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 1, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-44487.json b/2023/CVE-2023-44487.json index ab0dc43056..944cb52187 100644 --- a/2023/CVE-2023-44487.json +++ b/2023/CVE-2023-44487.json @@ -13,21 +13,21 @@ "description": "Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487", "fork": false, "created_at": "2023-10-10T14:20:42Z", - "updated_at": "2023-10-14T00:26:04Z", + "updated_at": "2023-10-14T05:40:32Z", "pushed_at": "2023-10-12T21:19:32Z", - "stargazers_count": 113, - "watchers_count": 113, + "stargazers_count": 122, + "watchers_count": 122, "has_discussions": false, - "forks_count": 23, + "forks_count": 24, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 23, - "watchers": 113, + "forks": 24, + "watchers": 122, "score": 0, - "subscribers_count": 2 + "subscribers_count": 5 }, { "id": 703303512, @@ -43,10 +43,10 @@ "description": "Proof of concept for DoS exploit ", "fork": false, "created_at": "2023-10-11T01:59:47Z", - "updated_at": "2023-10-13T13:23:21Z", + "updated_at": "2023-10-14T02:05:37Z", "pushed_at": "2023-10-13T11:19:10Z", - "stargazers_count": 21, - "watchers_count": 21, + "stargazers_count": 22, + "watchers_count": 22, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -63,9 +63,9 @@ ], "visibility": "public", "forks": 3, - "watchers": 21, + "watchers": 22, "score": 0, - "subscribers_count": 1 + "subscribers_count": 2 }, { "id": 703845749, @@ -155,6 +155,6 @@ "forks": 0, "watchers": 1, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-45540.json b/2023/CVE-2023-45540.json new file mode 100644 index 0000000000..aef4e0e324 --- /dev/null +++ b/2023/CVE-2023-45540.json @@ -0,0 +1,32 @@ +[ + { + "id": 701340984, + "name": "CVE-2023-45540", + "full_name": "soundarkutty\/CVE-2023-45540", + "owner": { + "login": "soundarkutty", + "id": 26168410, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26168410?v=4", + "html_url": "https:\/\/github.com\/soundarkutty" + }, + "html_url": "https:\/\/github.com\/soundarkutty\/CVE-2023-45540", + "description": "CVE-2023-45540 Jorani Leave Management System v1.0.3 – HTML Injection", + "fork": false, + "created_at": "2023-10-06T12:43:54Z", + "updated_at": "2023-10-14T05:12:25Z", + "pushed_at": "2023-10-06T16:04:42Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-45542.json b/2023/CVE-2023-45542.json new file mode 100644 index 0000000000..28435a0f74 --- /dev/null +++ b/2023/CVE-2023-45542.json @@ -0,0 +1,32 @@ +[ + { + "id": 696796100, + "name": "CVE-2023-45542", + "full_name": "ahrixia\/CVE-2023-45542", + "owner": { + "login": "ahrixia", + "id": 35935843, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35935843?v=4", + "html_url": "https:\/\/github.com\/ahrixia" + }, + "html_url": "https:\/\/github.com\/ahrixia\/CVE-2023-45542", + "description": "mooSocial v3.1.8 is vulnerable to cross-site scripting on search function.", + "fork": false, + "created_at": "2023-09-26T12:59:31Z", + "updated_at": "2023-10-14T04:47:03Z", + "pushed_at": "2023-10-14T04:47:15Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-4762.json b/2023/CVE-2023-4762.json index 5b961b2621..79fa9c05b3 100644 --- a/2023/CVE-2023-4762.json +++ b/2023/CVE-2023-4762.json @@ -27,7 +27,7 @@ "forks": 5, "watchers": 21, "score": 0, - "subscribers_count": 2 + "subscribers_count": 3 }, { "id": 697340903, diff --git a/2023/CVE-2023-4863.json b/2023/CVE-2023-4863.json index a8b720ae44..feb86428fb 100644 --- a/2023/CVE-2023-4863.json +++ b/2023/CVE-2023-4863.json @@ -13,7 +13,7 @@ "description": null, "fork": false, "created_at": "2023-09-21T05:22:51Z", - "updated_at": "2023-10-12T14:58:45Z", + "updated_at": "2023-10-14T02:05:10Z", "pushed_at": "2023-10-05T23:33:49Z", "stargazers_count": 225, "watchers_count": 225, @@ -27,7 +27,7 @@ "forks": 37, "watchers": 225, "score": 0, - "subscribers_count": 10 + "subscribers_count": 11 }, { "id": 696220876, diff --git a/2023/CVE-2023-4911.json b/2023/CVE-2023-4911.json index 336eabcbfa..00b5a8fa90 100644 --- a/2023/CVE-2023-4911.json +++ b/2023/CVE-2023-4911.json @@ -212,5 +212,35 @@ "watchers": 3, "score": 0, "subscribers_count": 1 + }, + { + "id": 704757696, + "name": "CVE-2023-4911", + "full_name": "guffre\/CVE-2023-4911", + "owner": { + "login": "guffre", + "id": 21281361, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21281361?v=4", + "html_url": "https:\/\/github.com\/guffre" + }, + "html_url": "https:\/\/github.com\/guffre\/CVE-2023-4911", + "description": "PoC for CVE-2023-4911 LooneyTuneables", + "fork": false, + "created_at": "2023-10-14T02:24:52Z", + "updated_at": "2023-10-14T02:25:44Z", + "pushed_at": "2023-10-14T02:34:18Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-5142.json b/2023/CVE-2023-5142.json index 0c9e7412ec..706bdb421a 100644 --- a/2023/CVE-2023-5142.json +++ b/2023/CVE-2023-5142.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 1, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-5521.json b/2023/CVE-2023-5521.json index c231f5cc9c..b40e24b71c 100644 --- a/2023/CVE-2023-5521.json +++ b/2023/CVE-2023-5521.json @@ -27,6 +27,6 @@ "forks": 5, "watchers": 11, "score": 0, - "subscribers_count": 1 + "subscribers_count": 2 } ] \ No newline at end of file diff --git a/README.md b/README.md index 1b0058ef42..bbd95e4372 100644 --- a/README.md +++ b/README.md @@ -768,6 +768,7 @@ - [silent6trinity/looney-tuneables](https://github.com/silent6trinity/looney-tuneables) - [hadrian3689/looney-tunables-CVE-2023-4911](https://github.com/hadrian3689/looney-tunables-CVE-2023-4911) - [ruycr4ft/CVE-2023-4911](https://github.com/ruycr4ft/CVE-2023-4911) +- [guffre/CVE-2023-4911](https://github.com/guffre/CVE-2023-4911) ### CVE-2023-5024 (2023-09-17) @@ -4475,6 +4476,12 @@ - [ggb0n/CVE-2023-44962](https://github.com/ggb0n/CVE-2023-44962) +### CVE-2023-45540 +- [soundarkutty/CVE-2023-45540](https://github.com/soundarkutty/CVE-2023-45540) + +### CVE-2023-45542 +- [ahrixia/CVE-2023-45542](https://github.com/ahrixia/CVE-2023-45542) + ### CVE-2023-51504 - [Sybelle03/CVE-2023-51504](https://github.com/Sybelle03/CVE-2023-51504) @@ -22776,6 +22783,7 @@ Incorrect sanitation of the 302 redirect field in HTTP transport method of apt versions 1.4.8 and earlier can lead to content injection by a MITM attacker, potentially leading to remote code execution on the target machine. +- [tonejito/check_CVE-2019-3462](https://github.com/tonejito/check_CVE-2019-3462) - [atilacastro/update-apt-package](https://github.com/atilacastro/update-apt-package) ### CVE-2019-3663 (2019-11-13) @@ -23039,6 +23047,13 @@ - [timwr/CVE-2019-5825](https://github.com/timwr/CVE-2019-5825) +### CVE-2019-5893 (2019-01-10) + +Nelson Open Source ERP v6.3.1 allows SQL Injection via the db/utils/query/data.xml query parameter. + + +- [EmreOvunc/OpenSource-ERP-SQL-Injection](https://github.com/EmreOvunc/OpenSource-ERP-SQL-Injection) + ### CVE-2019-6111 (2019-01-31) An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file). @@ -23085,6 +23100,13 @@ - [nikitapbst/cve-2019-6260](https://github.com/nikitapbst/cve-2019-6260) +### CVE-2019-6263 (2019-01-16) + +An issue was discovered in Joomla! before 3.9.2. Inadequate checks of the Global Configuration Text Filter settings allowed stored XSS. + + +- [praveensutar/CVE-2019-6263-Joomla-POC](https://github.com/praveensutar/CVE-2019-6263-Joomla-POC) + ### CVE-2019-6329 (2019-06-25) HP Support Assistant 8.7.50 and earlier allows a user to gain system privilege and allows unauthorized modification of directories or files. Note: A different vulnerability than CVE-2019-6328. @@ -23161,6 +23183,13 @@ - [knqyf263/CVE-2019-6467](https://github.com/knqyf263/CVE-2019-6467) +### CVE-2019-6487 (2019-01-18) + +TP-Link WDR Series devices through firmware v3 (such as TL-WDR5620 V3.0) are affected by command injection (after login) leading to remote code execution, because shell metacharacters can be included in the weather get_weather_observe citycode field. + + +- [afang5472/TP-Link-WDR-Router-Command-injection_POC](https://github.com/afang5472/TP-Link-WDR-Router-Command-injection_POC) + ### CVE-2019-6690 (2019-03-17) python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to decrypt other ciphertext than intended. To perform the attack, the passphrase to gnupg must be controlled by the adversary and the ciphertext should be trusted. Related to a "CWE-20: Improper Input Validation" issue affecting the affect functionality component. @@ -29465,6 +29494,7 @@ - [homjxi0e/CVE-2017-3881-exploit-cisco-](https://github.com/homjxi0e/CVE-2017-3881-exploit-cisco-) - [homjxi0e/CVE-2017-3881-Cisco](https://github.com/homjxi0e/CVE-2017-3881-Cisco) - [mzakyz666/PoC-CVE-2017-3881](https://github.com/mzakyz666/PoC-CVE-2017-3881) +- [1337g/CVE-2017-3881](https://github.com/1337g/CVE-2017-3881) ### CVE-2017-4490 - [homjxi0e/CVE-2017-4490-](https://github.com/homjxi0e/CVE-2017-4490-) @@ -29672,6 +29702,9 @@ - [Eugnis/spectre-attack](https://github.com/Eugnis/spectre-attack) +- [EdwardOwusuAdjei/Spectre-PoC](https://github.com/EdwardOwusuAdjei/Spectre-PoC) +- [poilynx/spectre-attack-example](https://github.com/poilynx/spectre-attack-example) +- [pedrolucasoliva/spectre-attack-demo](https://github.com/pedrolucasoliva/spectre-attack-demo) - [ixtal23/spectreScope](https://github.com/ixtal23/spectreScope) - [albertleecn/cve-2017-5753](https://github.com/albertleecn/cve-2017-5753) - [sachinthaBS/Spectre-Vulnerability-CVE-2017-5753-](https://github.com/sachinthaBS/Spectre-Vulnerability-CVE-2017-5753-) @@ -29861,6 +29894,7 @@ - [zcgonvh/cve-2017-7269-tool](https://github.com/zcgonvh/cve-2017-7269-tool) - [mirrorblack/CVE-2017-7269](https://github.com/mirrorblack/CVE-2017-7269) - [Al1ex/CVE-2017-7269](https://github.com/Al1ex/CVE-2017-7269) +- [ThanHuuTuan/CVE-2017-7269](https://github.com/ThanHuuTuan/CVE-2017-7269) - [crypticdante/CVE-2017-7269](https://github.com/crypticdante/CVE-2017-7269) - [denchief1/CVE-2017-7269_Python3](https://github.com/denchief1/CVE-2017-7269_Python3) - [denchief1/CVE-2017-7269](https://github.com/denchief1/CVE-2017-7269) @@ -30194,6 +30228,13 @@ - [jakabakos/CVE-2017-9096-iText-XXE](https://github.com/jakabakos/CVE-2017-9096-iText-XXE) +### CVE-2017-9097 (2017-06-15) + +In Anti-Web through 3.8.7, as used on NetBiter FGW200 devices through 3.21.2, WS100 devices through 3.30.5, EC150 devices through 1.40.0, WS200 devices through 3.30.4, EC250 devices through 1.40.0, and other products, an LFI vulnerability allows a remote attacker to read or modify files through a path traversal technique, as demonstrated by reading the password file, or using the template parameter to cgi-bin/write.cgi to write to an arbitrary file. + + +- [MDudek-ICS/AntiWeb_testing-Suite](https://github.com/MDudek-ICS/AntiWeb_testing-Suite) + ### CVE-2017-9101 (2017-05-21) import.php (aka the Phonebook import feature) in PlaySMS 1.4 allows remote code execution via vectors involving the User-Agent HTTP header and PHP code in the name of a file. @@ -30425,6 +30466,7 @@ - [ZH3FENG/PoCs-Weblogic_2017_10271](https://github.com/ZH3FENG/PoCs-Weblogic_2017_10271) - [c0mmand3rOpSec/CVE-2017-10271](https://github.com/c0mmand3rOpSec/CVE-2017-10271) - [Luffin/CVE-2017-10271](https://github.com/Luffin/CVE-2017-10271) +- [cjjduck/weblogic_wls_wsat_rce](https://github.com/cjjduck/weblogic_wls_wsat_rce) - [kkirsche/CVE-2017-10271](https://github.com/kkirsche/CVE-2017-10271) - [pssss/CVE-2017-10271](https://github.com/pssss/CVE-2017-10271) - [SuperHacker-liuan/cve-2017-10271-poc](https://github.com/SuperHacker-liuan/cve-2017-10271-poc) @@ -31050,6 +31092,13 @@ - [fei9747/CVE-2017-16995](https://github.com/fei9747/CVE-2017-16995) - [anldori/CVE-2017-16995](https://github.com/anldori/CVE-2017-16995) +### CVE-2017-16997 (2017-12-17) + +elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated with misinterpretion of an empty RPATH/RUNPATH token as the "./" directory. NOTE: this configuration of RPATH/RUNPATH for a privileged program is apparently very uncommon; most likely, no such program is shipped with any common Linux distribution. + + +- [Xiami2012/CVE-2017-16997-poc](https://github.com/Xiami2012/CVE-2017-16997-poc) + ### CVE-2017-17058 (2017-11-29) ** DISPUTED ** The WooCommerce plugin through 3.x for WordPress has a Directory Traversal Vulnerability via a /wp-content/plugins/woocommerce/templates/emails/plain/ URI, which accesses a parent directory. NOTE: a software maintainer indicates that Directory Traversal is not possible because all of the template files have "if (!defined('ABSPATH')) {exit;}" code. @@ -31104,6 +31153,13 @@ - [nu11pointer/goahead-rce-exploit](https://github.com/nu11pointer/goahead-rce-exploit) - [freitzzz/bash-CVE-2017-17562](https://github.com/freitzzz/bash-CVE-2017-17562) +### CVE-2017-17692 (2017-12-21) + +Samsung Internet Browser 5.4.02.3 allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via crafted JavaScript code that redirects to a child tab and rewrites the innerHTML property. + + +- [specloli/CVE-2017-17692](https://github.com/specloli/CVE-2017-17692) + ### CVE-2017-17736 (2018-03-23) Kentico 9.0 before 9.0.51 and 10.0 before 10.0.48 allows remote attackers to obtain Global Administrator access by visiting CMSInstall/install.aspx and then navigating to the CMS Administration Dashboard. @@ -31241,6 +31297,7 @@ Linux distributions that have not patched their long-term kernels with https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (committed on April 14, 2015). This kernel vulnerability was fixed in April 2015 by commit a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (backported to Linux 3.10.77 in May 2015), but it was not recognized as a security threat. With CONFIG_ARCH_BINFMT_ELF_RANDOMIZE_PIE enabled, and a normal top-down address allocation strategy, load_elf_binary() will attempt to map a PIE binary into an address range immediately below mm->mmap_base. Unfortunately, load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary which means that, while the first PT_LOAD segment is mapped below mm->mmap_base, the subsequent PT_LOAD segment(s) end up being mapped above mm->mmap_base into the are that is supposed to be the "gap" between the stack and the binary. +- [RicterZ/PIE-Stack-Clash-CVE-2017-1000253](https://github.com/RicterZ/PIE-Stack-Clash-CVE-2017-1000253) - [sxlmnwb/CVE-2017-1000253](https://github.com/sxlmnwb/CVE-2017-1000253) ### CVE-2017-1000353 (2018-01-29)