diff --git a/2016/CVE-2016-10033.json b/2016/CVE-2016-10033.json index 578e23aece..a08ff937ca 100644 --- a/2016/CVE-2016-10033.json +++ b/2016/CVE-2016-10033.json @@ -82,10 +82,10 @@ "description": "RCE against WordPress 4.6; Python port of https:\/\/exploitbox.io\/vuln\/WordPress-Exploit-4-6-RCE-CODE-EXEC-CVE-2016-10033.html", "fork": false, "created_at": "2017-05-10T03:18:46Z", - "updated_at": "2023-09-28T10:41:19Z", + "updated_at": "2024-03-04T15:30:22Z", "pushed_at": "2017-05-10T03:32:56Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -94,7 +94,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 9, + "watchers": 10, "score": 0, "subscribers_count": 2 }, diff --git a/2016/CVE-2016-9795.json b/2016/CVE-2016-9795.json index f59282c922..c568fafd52 100644 --- a/2016/CVE-2016-9795.json +++ b/2016/CVE-2016-9795.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2017/CVE-2017-0199.json b/2017/CVE-2017-0199.json index ab683f7003..b5b49b75ac 100644 --- a/2017/CVE-2017-0199.json +++ b/2017/CVE-2017-0199.json @@ -272,7 +272,7 @@ "forks": 3, "watchers": 4, "score": 0, - "subscribers_count": 0 + "subscribers_count": 3 }, { "id": 89314149, diff --git a/2017/CVE-2017-0204.json b/2017/CVE-2017-0204.json index 943babfa2f..4d8e964164 100644 --- a/2017/CVE-2017-0204.json +++ b/2017/CVE-2017-0204.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 3 } ] \ No newline at end of file diff --git a/2017/CVE-2017-9506.json b/2017/CVE-2017-9506.json index 1deceed864..01fe227859 100644 --- a/2017/CVE-2017-9506.json +++ b/2017/CVE-2017-9506.json @@ -31,7 +31,7 @@ "forks": 51, "watchers": 184, "score": 0, - "subscribers_count": 5 + "subscribers_count": 4 }, { "id": 216503835, diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 912a12f191..6478e3d5d0 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -2554,5 +2554,35 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 767077239, + "name": "smbGhostCVE-2020-0796", + "full_name": "AdamSonov\/smbGhostCVE-2020-0796", + "owner": { + "login": "AdamSonov", + "id": 96952084, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96952084?v=4", + "html_url": "https:\/\/github.com\/AdamSonov" + }, + "html_url": "https:\/\/github.com\/AdamSonov\/smbGhostCVE-2020-0796", + "description": "This script will help you to scan for smbGhost vulnerability(CVE-2020-0796)", + "fork": false, + "created_at": "2024-03-04T16:59:53Z", + "updated_at": "2024-03-04T18:05:44Z", + "pushed_at": "2024-03-04T18:05:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-5410.json b/2020/CVE-2020-5410.json index 919ded4259..4a89974def 100644 --- a/2020/CVE-2020-5410.json +++ b/2020/CVE-2020-5410.json @@ -58,35 +58,5 @@ "watchers": 30, "score": 0, "subscribers_count": 4 - }, - { - "id": 340598389, - "name": "SpringCloud-Config-CVE-2020-5410", - "full_name": "thelostworldFree\/SpringCloud-Config-CVE-2020-5410", - "owner": { - "login": "thelostworldFree", - "id": 24971604, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24971604?v=4", - "html_url": "https:\/\/github.com\/thelostworldFree" - }, - "html_url": "https:\/\/github.com\/thelostworldFree\/SpringCloud-Config-CVE-2020-5410", - "description": "Spring Cloud Config 目录穿越漏洞(CVE-2020-5410) 复现", - "fork": false, - "created_at": "2021-02-20T08:05:51Z", - "updated_at": "2021-02-20T08:11:26Z", - "pushed_at": "2021-02-20T08:11:25Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 2 } ] \ No newline at end of file diff --git a/2020/CVE-2020-6287.json b/2020/CVE-2020-6287.json index 9fc333fe72..ea3897fab0 100644 --- a/2020/CVE-2020-6287.json +++ b/2020/CVE-2020-6287.json @@ -13,10 +13,10 @@ "description": "PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)", "fork": false, "created_at": "2020-07-15T15:20:09Z", - "updated_at": "2024-02-01T07:34:40Z", + "updated_at": "2024-03-04T16:46:21Z", "pushed_at": "2020-09-29T17:20:12Z", - "stargazers_count": 212, - "watchers_count": 212, + "stargazers_count": 214, + "watchers_count": 214, "has_discussions": false, "forks_count": 69, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 69, - "watchers": 212, + "watchers": 214, "score": 0, "subscribers_count": 14 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 66e273fa71..604e378989 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -907,7 +907,7 @@ "description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ", "fork": false, "created_at": "2021-12-10T23:19:28Z", - "updated_at": "2024-03-04T10:51:22Z", + "updated_at": "2024-03-04T16:02:02Z", "pushed_at": "2024-02-12T22:37:25Z", "stargazers_count": 1721, "watchers_count": 1721, @@ -1268,7 +1268,7 @@ "description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks", "fork": false, "created_at": "2021-12-11T07:19:11Z", - "updated_at": "2024-02-26T06:53:46Z", + "updated_at": "2024-03-04T15:02:32Z", "pushed_at": "2023-06-13T09:17:54Z", "stargazers_count": 764, "watchers_count": 764, @@ -3671,13 +3671,13 @@ "stargazers_count": 3336, "watchers_count": 3336, "has_discussions": true, - "forks_count": 739, + "forks_count": 740, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 739, + "forks": 740, "watchers": 3336, "score": 0, "subscribers_count": 58 @@ -5200,7 +5200,7 @@ "description": "PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs", "fork": false, "created_at": "2021-12-13T21:39:51Z", - "updated_at": "2024-01-29T09:28:49Z", + "updated_at": "2024-03-04T15:46:12Z", "pushed_at": "2021-12-21T01:24:46Z", "stargazers_count": 291, "watchers_count": 291, diff --git a/2022/CVE-2022-1388.json b/2022/CVE-2022-1388.json index 3b97953211..ed45e8c498 100644 --- a/2022/CVE-2022-1388.json +++ b/2022/CVE-2022-1388.json @@ -73,10 +73,10 @@ "description": "This vulnerability may allow an unauthenticated attacker with network access to the BIG-IP system through the management port and\/or self IP addresses to execute arbitrary system commands, create or delete files, or disable services. There is no data plane exposure; this is a control plane issue only.", "fork": false, "created_at": "2022-05-06T06:22:47Z", - "updated_at": "2024-01-24T11:19:43Z", + "updated_at": "2024-03-04T17:13:22Z", "pushed_at": "2022-05-06T15:33:14Z", - "stargazers_count": 23, - "watchers_count": 23, + "stargazers_count": 24, + "watchers_count": 24, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -92,7 +92,7 @@ ], "visibility": "public", "forks": 9, - "watchers": 23, + "watchers": 24, "score": 0, "subscribers_count": 2 }, diff --git a/2022/CVE-2022-20699.json b/2022/CVE-2022-20699.json index 7fb43a8309..005cc095a4 100644 --- a/2022/CVE-2022-20699.json +++ b/2022/CVE-2022-20699.json @@ -13,19 +13,19 @@ "description": "Cisco Anyconnect VPN unauth RCE (rwx stack)", "fork": false, "created_at": "2022-02-07T15:53:21Z", - "updated_at": "2024-02-21T15:44:43Z", + "updated_at": "2024-03-04T15:20:05Z", "pushed_at": "2022-02-07T15:55:03Z", - "stargazers_count": 238, - "watchers_count": 238, + "stargazers_count": 239, + "watchers_count": 239, "has_discussions": false, - "forks_count": 42, + "forks_count": 43, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 42, - "watchers": 238, + "forks": 43, + "watchers": 239, "score": 0, "subscribers_count": 12 }, diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index f5c28af8fd..64ce36cc65 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -13,10 +13,10 @@ "description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。", "fork": false, "created_at": "2022-05-31T07:44:01Z", - "updated_at": "2024-03-01T12:35:48Z", + "updated_at": "2024-03-04T17:35:27Z", "pushed_at": "2023-02-26T14:06:05Z", - "stargazers_count": 1101, - "watchers_count": 1101, + "stargazers_count": 1102, + "watchers_count": 1102, "has_discussions": true, "forks_count": 186, "allow_forking": true, @@ -45,7 +45,7 @@ ], "visibility": "public", "forks": 186, - "watchers": 1101, + "watchers": 1102, "score": 0, "subscribers_count": 18 }, diff --git a/2022/CVE-2022-36553.json b/2022/CVE-2022-36553.json index 11c1e36292..0169853c5b 100644 --- a/2022/CVE-2022-36553.json +++ b/2022/CVE-2022-36553.json @@ -13,10 +13,10 @@ "description": "PoC Script for CVE-2022-36553: Exploits an unauthenticated remote command injection vulnerability in Hytec Inter HWL-2511-SS device.", "fork": false, "created_at": "2024-01-08T21:53:46Z", - "updated_at": "2024-02-03T23:46:49Z", + "updated_at": "2024-03-04T15:23:45Z", "pushed_at": "2024-01-08T22:39:33Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -33,7 +33,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 5, + "watchers": 6, "score": 0, "subscribers_count": 0 } diff --git a/2023/CVE-2023-33565.json b/2023/CVE-2023-33565.json new file mode 100644 index 0000000000..89ec5f800a --- /dev/null +++ b/2023/CVE-2023-33565.json @@ -0,0 +1,32 @@ +[ + { + "id": 657246757, + "name": "CVE-2023-33565", + "full_name": "yashpatelphd\/CVE-2023-33565", + "owner": { + "login": "yashpatelphd", + "id": 137430106, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137430106?v=4", + "html_url": "https:\/\/github.com\/yashpatelphd" + }, + "html_url": "https:\/\/github.com\/yashpatelphd\/CVE-2023-33565", + "description": "Denial-of-Service (DoS) Vulnerability in ROS2 Foxy Fitzroy", + "fork": false, + "created_at": "2023-06-22T16:26:55Z", + "updated_at": "2023-06-22T16:45:03Z", + "pushed_at": "2024-02-27T11:44:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-33566.json b/2023/CVE-2023-33566.json new file mode 100644 index 0000000000..6ede735596 --- /dev/null +++ b/2023/CVE-2023-33566.json @@ -0,0 +1,32 @@ +[ + { + "id": 657250385, + "name": "CVE-2023-33566", + "full_name": "yashpatelphd\/CVE-2023-33566", + "owner": { + "login": "yashpatelphd", + "id": 137430106, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137430106?v=4", + "html_url": "https:\/\/github.com\/yashpatelphd" + }, + "html_url": "https:\/\/github.com\/yashpatelphd\/CVE-2023-33566", + "description": "Unauthorized Node Injection Vulnerability in ROS2 Foxy Fitzroy", + "fork": false, + "created_at": "2023-06-22T16:36:33Z", + "updated_at": "2023-06-22T16:45:22Z", + "pushed_at": "2024-02-27T11:44:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-33567.json b/2023/CVE-2023-33567.json new file mode 100644 index 0000000000..b8a6a0c4b1 --- /dev/null +++ b/2023/CVE-2023-33567.json @@ -0,0 +1,32 @@ +[ + { + "id": 657251638, + "name": "CVE-2023-33567", + "full_name": "yashpatelphd\/CVE-2023-33567", + "owner": { + "login": "yashpatelphd", + "id": 137430106, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137430106?v=4", + "html_url": "https:\/\/github.com\/yashpatelphd" + }, + "html_url": "https:\/\/github.com\/yashpatelphd\/CVE-2023-33567", + "description": "Unauthorized Access Vulnerability in ROS2 Foxy Fitzroy", + "fork": false, + "created_at": "2023-06-22T16:39:52Z", + "updated_at": "2023-06-22T16:46:00Z", + "pushed_at": "2024-02-27T11:45:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-41993.json b/2023/CVE-2023-41993.json index 7fbf582656..4d6bd596f5 100644 --- a/2023/CVE-2023-41993.json +++ b/2023/CVE-2023-41993.json @@ -48,13 +48,13 @@ "stargazers_count": 15, "watchers_count": 15, "has_discussions": false, - "forks_count": 8, + "forks_count": 9, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 8, + "forks": 9, "watchers": 15, "score": 0, "subscribers_count": 3 diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index cf70df502f..8f82b77f20 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -88,5 +88,35 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 766985531, + "name": "Blue0DAY", + "full_name": "R4HUL-INDIAN\/Blue0DAY", + "owner": { + "login": "R4HUL-INDIAN", + "id": 106301889, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106301889?v=4", + "html_url": "https:\/\/github.com\/R4HUL-INDIAN" + }, + "html_url": "https:\/\/github.com\/R4HUL-INDIAN\/Blue0DAY", + "description": "The Blue0DAY tool implements Unauthenticated Peering, leading to code execution via HID keyboard in Bluetooth CVE-2023-45866. 🚨", + "fork": false, + "created_at": "2024-03-04T13:55:16Z", + "updated_at": "2024-03-04T13:56:02Z", + "pushed_at": "2024-03-04T13:55:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-46747.json b/2023/CVE-2023-46747.json index 6ea1f9e2c6..ac073ecd6a 100644 --- a/2023/CVE-2023-46747.json +++ b/2023/CVE-2023-46747.json @@ -43,12 +43,12 @@ "description": "exploit for f5-big-ip RCE cve-2023-46747", "fork": false, "created_at": "2023-11-01T09:31:05Z", - "updated_at": "2024-02-27T13:25:34Z", + "updated_at": "2024-03-04T17:39:26Z", "pushed_at": "2024-01-20T02:27:51Z", - "stargazers_count": 168, - "watchers_count": 168, + "stargazers_count": 169, + "watchers_count": 169, "has_discussions": false, - "forks_count": 39, + "forks_count": 40, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -60,8 +60,8 @@ "redteam" ], "visibility": "public", - "forks": 39, - "watchers": 168, + "forks": 40, + "watchers": 169, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-51197.json b/2023/CVE-2023-51197.json new file mode 100644 index 0000000000..5922925f1a --- /dev/null +++ b/2023/CVE-2023-51197.json @@ -0,0 +1,32 @@ +[ + { + "id": 741526927, + "name": "CVE-2023-51197", + "full_name": "yashpatelphd\/CVE-2023-51197", + "owner": { + "login": "yashpatelphd", + "id": 137430106, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137430106?v=4", + "html_url": "https:\/\/github.com\/yashpatelphd" + }, + "html_url": "https:\/\/github.com\/yashpatelphd\/CVE-2023-51197", + "description": "Shell Injection Vulnerability in ROS2 Foxy Fitzroy", + "fork": false, + "created_at": "2024-01-10T15:25:10Z", + "updated_at": "2024-01-10T15:36:03Z", + "pushed_at": "2024-02-27T11:45:55Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-51198.json b/2023/CVE-2023-51198.json new file mode 100644 index 0000000000..56b6e6ce91 --- /dev/null +++ b/2023/CVE-2023-51198.json @@ -0,0 +1,32 @@ +[ + { + "id": 741532916, + "name": "CVE-2023-51198", + "full_name": "yashpatelphd\/CVE-2023-51198", + "owner": { + "login": "yashpatelphd", + "id": 137430106, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137430106?v=4", + "html_url": "https:\/\/github.com\/yashpatelphd" + }, + "html_url": "https:\/\/github.com\/yashpatelphd\/CVE-2023-51198", + "description": "Privilege Escalation Vulnerability in ROS2 Foxy Fitzroy", + "fork": false, + "created_at": "2024-01-10T15:39:19Z", + "updated_at": "2024-01-10T15:41:00Z", + "pushed_at": "2024-02-27T11:46:15Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-51199.json b/2023/CVE-2023-51199.json new file mode 100644 index 0000000000..5c84a3817a --- /dev/null +++ b/2023/CVE-2023-51199.json @@ -0,0 +1,32 @@ +[ + { + "id": 741538841, + "name": "CVE-2023-51199", + "full_name": "yashpatelphd\/CVE-2023-51199", + "owner": { + "login": "yashpatelphd", + "id": 137430106, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137430106?v=4", + "html_url": "https:\/\/github.com\/yashpatelphd" + }, + "html_url": "https:\/\/github.com\/yashpatelphd\/CVE-2023-51199", + "description": "Buffer Overflow Vulnerability in ROS2 Foxy Fitzroy", + "fork": false, + "created_at": "2024-01-10T15:53:14Z", + "updated_at": "2024-01-10T16:12:31Z", + "pushed_at": "2024-02-27T11:46:46Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-51200.json b/2023/CVE-2023-51200.json new file mode 100644 index 0000000000..b54d1a86d1 --- /dev/null +++ b/2023/CVE-2023-51200.json @@ -0,0 +1,32 @@ +[ + { + "id": 741549154, + "name": "CVE-2023-51200", + "full_name": "yashpatelphd\/CVE-2023-51200", + "owner": { + "login": "yashpatelphd", + "id": 137430106, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137430106?v=4", + "html_url": "https:\/\/github.com\/yashpatelphd" + }, + "html_url": "https:\/\/github.com\/yashpatelphd\/CVE-2023-51200", + "description": "Security Misconfiguration in ROS2 Foxy Fitzroy", + "fork": false, + "created_at": "2024-01-10T16:17:59Z", + "updated_at": "2024-01-10T16:32:49Z", + "pushed_at": "2024-02-27T11:47:29Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-51201.json b/2023/CVE-2023-51201.json new file mode 100644 index 0000000000..9fa1f37f55 --- /dev/null +++ b/2023/CVE-2023-51201.json @@ -0,0 +1,32 @@ +[ + { + "id": 741562121, + "name": "CVE-2023-51201", + "full_name": "yashpatelphd\/CVE-2023-51201", + "owner": { + "login": "yashpatelphd", + "id": 137430106, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137430106?v=4", + "html_url": "https:\/\/github.com\/yashpatelphd" + }, + "html_url": "https:\/\/github.com\/yashpatelphd\/CVE-2023-51201", + "description": "Information Leakage in ROS2 Foxy Fitzroy via Plaintext Message Transmission", + "fork": false, + "created_at": "2024-01-10T16:46:56Z", + "updated_at": "2024-01-10T16:54:06Z", + "pushed_at": "2024-02-27T11:48:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-51202.json b/2023/CVE-2023-51202.json new file mode 100644 index 0000000000..95f0e25597 --- /dev/null +++ b/2023/CVE-2023-51202.json @@ -0,0 +1,32 @@ +[ + { + "id": 741581614, + "name": "CVE-2023-51202", + "full_name": "yashpatelphd\/CVE-2023-51202", + "owner": { + "login": "yashpatelphd", + "id": 137430106, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137430106?v=4", + "html_url": "https:\/\/github.com\/yashpatelphd" + }, + "html_url": "https:\/\/github.com\/yashpatelphd\/CVE-2023-51202", + "description": "OS Command Injection Vulnerability in ROS2 Foxy Fitzroy", + "fork": false, + "created_at": "2024-01-10T17:33:19Z", + "updated_at": "2024-01-10T17:43:05Z", + "pushed_at": "2024-02-27T11:48:48Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-51204.json b/2023/CVE-2023-51204.json new file mode 100644 index 0000000000..c4158db317 --- /dev/null +++ b/2023/CVE-2023-51204.json @@ -0,0 +1,32 @@ +[ + { + "id": 741590400, + "name": "CVE-2023-51204", + "full_name": "yashpatelphd\/CVE-2023-51204", + "owner": { + "login": "yashpatelphd", + "id": 137430106, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137430106?v=4", + "html_url": "https:\/\/github.com\/yashpatelphd" + }, + "html_url": "https:\/\/github.com\/yashpatelphd\/CVE-2023-51204", + "description": "Insecure Deserialization Vulnerability in ROS2 Foxy Fitzroy", + "fork": false, + "created_at": "2024-01-10T17:54:59Z", + "updated_at": "2024-01-10T18:08:19Z", + "pushed_at": "2024-02-27T11:49:09Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-51208.json b/2023/CVE-2023-51208.json new file mode 100644 index 0000000000..9575795a7d --- /dev/null +++ b/2023/CVE-2023-51208.json @@ -0,0 +1,32 @@ +[ + { + "id": 741595744, + "name": "CVE-2023-51208", + "full_name": "yashpatelphd\/CVE-2023-51208", + "owner": { + "login": "yashpatelphd", + "id": 137430106, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137430106?v=4", + "html_url": "https:\/\/github.com\/yashpatelphd" + }, + "html_url": "https:\/\/github.com\/yashpatelphd\/CVE-2023-51208", + "description": "Arbitrary File Upload Vulnerability in ROS2 Foxy Fitzroy", + "fork": false, + "created_at": "2024-01-10T18:08:37Z", + "updated_at": "2024-01-10T18:12:26Z", + "pushed_at": "2024-02-27T11:49:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-6548.json b/2023/CVE-2023-6548.json index 934e5a1b8f..3e7184eb6f 100644 --- a/2023/CVE-2023-6548.json +++ b/2023/CVE-2023-6548.json @@ -13,10 +13,10 @@ "description": "0day for Citrix Netscaler ADC and NetScaler Gateway latest versions", "fork": false, "created_at": "2024-03-04T08:57:27Z", - "updated_at": "2024-03-04T09:36:33Z", + "updated_at": "2024-03-04T18:10:05Z", "pushed_at": "2024-03-04T09:36:29Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-0519.json b/2024/CVE-2024-0519.json index 16b52223e5..ab1605f5c9 100644 --- a/2024/CVE-2024-0519.json +++ b/2024/CVE-2024-0519.json @@ -13,10 +13,10 @@ "description": "Execute arbitrary code on the victim’s device, compromising data security and system integrity in Chrome 120.0.6099", "fork": false, "created_at": "2024-03-04T10:25:06Z", - "updated_at": "2024-03-04T10:40:12Z", + "updated_at": "2024-03-04T18:08:20Z", "pushed_at": "2024-03-04T10:40:07Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-1071.json b/2024/CVE-2024-1071.json index 0de40a7e16..7fde5130d7 100644 --- a/2024/CVE-2024-1071.json +++ b/2024/CVE-2024-1071.json @@ -28,5 +28,35 @@ "watchers": 3, "score": 0, "subscribers_count": 1 + }, + { + "id": 767118935, + "name": "CVE-2024-1071-Docker", + "full_name": "Trackflaw\/CVE-2024-1071-Docker", + "owner": { + "login": "Trackflaw", + "id": 78696986, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78696986?v=4", + "html_url": "https:\/\/github.com\/Trackflaw" + }, + "html_url": "https:\/\/github.com\/Trackflaw\/CVE-2024-1071-Docker", + "description": "CVE-2024-1071 with Docker", + "fork": false, + "created_at": "2024-03-04T18:29:17Z", + "updated_at": "2024-03-04T18:29:17Z", + "pushed_at": "2024-03-04T18:29:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-1208.json b/2024/CVE-2024-1208.json index 04933b8bd7..f7062c4e2c 100644 --- a/2024/CVE-2024-1208.json +++ b/2024/CVE-2024-1208.json @@ -13,10 +13,10 @@ "description": "Sensitive Information Exposure via API in LearnDash.", "fork": false, "created_at": "2024-02-05T17:46:41Z", - "updated_at": "2024-02-05T21:15:51Z", + "updated_at": "2024-03-04T17:31:59Z", "pushed_at": "2024-02-05T17:58:05Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-1709.json b/2024/CVE-2024-1709.json index 0d0be7c661..1460a3c8f1 100644 --- a/2024/CVE-2024-1709.json +++ b/2024/CVE-2024-1709.json @@ -18,7 +18,7 @@ "stargazers_count": 81, "watchers_count": 81, "has_discussions": false, - "forks_count": 18, + "forks_count": 19, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -33,7 +33,7 @@ "screenconnect" ], "visibility": "public", - "forks": 18, + "forks": 19, "watchers": 81, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-20931.json b/2024/CVE-2024-20931.json index 1cd83da44c..6189a1b2f0 100644 --- a/2024/CVE-2024-20931.json +++ b/2024/CVE-2024-20931.json @@ -13,10 +13,10 @@ "description": "The Poc for CVE-2024-20931", "fork": false, "created_at": "2024-02-02T01:58:49Z", - "updated_at": "2024-03-01T09:34:51Z", + "updated_at": "2024-03-04T18:08:31Z", "pushed_at": "2024-02-02T02:05:01Z", - "stargazers_count": 66, - "watchers_count": 66, + "stargazers_count": 67, + "watchers_count": 67, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 66, + "watchers": 67, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-21413.json b/2024/CVE-2024-21413.json index f23e970c39..b52db47bd6 100644 --- a/2024/CVE-2024-21413.json +++ b/2024/CVE-2024-21413.json @@ -18,13 +18,13 @@ "stargazers_count": 117, "watchers_count": 117, "has_discussions": false, - "forks_count": 25, + "forks_count": 26, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 25, + "forks": 26, "watchers": 117, "score": 0, "subscribers_count": 4 @@ -43,19 +43,19 @@ "description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability", "fork": false, "created_at": "2024-02-16T15:17:59Z", - "updated_at": "2024-03-03T17:21:38Z", + "updated_at": "2024-03-04T17:49:00Z", "pushed_at": "2024-02-19T20:00:35Z", - "stargazers_count": 509, - "watchers_count": 509, + "stargazers_count": 510, + "watchers_count": 510, "has_discussions": false, - "forks_count": 114, + "forks_count": 116, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 114, - "watchers": 509, + "forks": 116, + "watchers": 510, "score": 0, "subscribers_count": 6 }, diff --git a/2024/CVE-2024-21762.json b/2024/CVE-2024-21762.json index 807d993dda..d5f50b76bb 100644 --- a/2024/CVE-2024-21762.json +++ b/2024/CVE-2024-21762.json @@ -73,10 +73,10 @@ "description": "Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762", "fork": false, "created_at": "2024-02-28T21:16:10Z", - "updated_at": "2024-03-04T08:34:24Z", + "updated_at": "2024-03-04T14:38:20Z", "pushed_at": "2024-03-01T20:02:52Z", - "stargazers_count": 25, - "watchers_count": 25, + "stargazers_count": 26, + "watchers_count": 26, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 25, + "watchers": 26, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-21887.json b/2024/CVE-2024-21887.json index 8b84117379..4d7beed7a7 100644 --- a/2024/CVE-2024-21887.json +++ b/2024/CVE-2024-21887.json @@ -73,10 +73,10 @@ "description": "A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.", "fork": false, "created_at": "2024-01-16T20:59:38Z", - "updated_at": "2024-02-26T07:16:55Z", + "updated_at": "2024-03-04T18:00:30Z", "pushed_at": "2024-01-17T00:38:28Z", - "stargazers_count": 38, - "watchers_count": 38, + "stargazers_count": 39, + "watchers_count": 39, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 11, - "watchers": 38, + "watchers": 39, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-21893.json b/2024/CVE-2024-21893.json index b1f08f5fcc..d93fd7ab52 100644 --- a/2024/CVE-2024-21893.json +++ b/2024/CVE-2024-21893.json @@ -13,10 +13,10 @@ "description": "CVE-2024-21893: SSRF Vulnerability in Ivanti Connect Secure", "fork": false, "created_at": "2024-02-02T22:59:21Z", - "updated_at": "2024-02-29T00:24:20Z", + "updated_at": "2024-03-04T17:57:22Z", "pushed_at": "2024-02-02T23:27:10Z", - "stargazers_count": 73, - "watchers_count": 73, + "stargazers_count": 74, + "watchers_count": 74, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 11, - "watchers": 73, + "watchers": 74, "score": 0, "subscribers_count": 2 }, @@ -43,10 +43,10 @@ "description": "CVE-2024-21893 to CVE-2024-21887 Exploit Toolkit", "fork": false, "created_at": "2024-02-03T11:33:40Z", - "updated_at": "2024-02-24T12:35:26Z", + "updated_at": "2024-03-04T18:00:58Z", "pushed_at": "2024-02-03T11:48:37Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 11, + "watchers_count": 11, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 10, + "watchers": 11, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-23897.json b/2024/CVE-2024-23897.json index 5fe206f15b..8fc733abf4 100644 --- a/2024/CVE-2024-23897.json +++ b/2024/CVE-2024-23897.json @@ -500,10 +500,10 @@ "description": "Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)", "fork": false, "created_at": "2024-02-04T20:56:42Z", - "updated_at": "2024-03-03T20:44:03Z", + "updated_at": "2024-03-04T17:15:36Z", "pushed_at": "2024-02-05T14:10:26Z", - "stargazers_count": 13, - "watchers_count": 13, + "stargazers_count": 14, + "watchers_count": 14, "has_discussions": true, "forks_count": 2, "allow_forking": true, @@ -512,7 +512,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 13, + "watchers": 14, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-25600.json b/2024/CVE-2024-25600.json index 041f85afe5..229ab1588f 100644 --- a/2024/CVE-2024-25600.json +++ b/2024/CVE-2024-25600.json @@ -13,10 +13,10 @@ "description": "Unauthenticated Remote Code Execution – Bricks <= 1.9.6", "fork": false, "created_at": "2024-02-20T20:16:09Z", - "updated_at": "2024-03-04T11:15:15Z", + "updated_at": "2024-03-04T13:25:07Z", "pushed_at": "2024-02-25T21:50:09Z", - "stargazers_count": 95, - "watchers_count": 95, + "stargazers_count": 96, + "watchers_count": 96, "has_discussions": false, "forks_count": 20, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 20, - "watchers": 95, + "watchers": 96, "score": 0, "subscribers_count": 1 }, diff --git a/README.md b/README.md index e4a231ded6..6316254aad 100644 --- a/README.md +++ b/README.md @@ -72,6 +72,7 @@ ### CVE-2024-1071 - [gbrsh/CVE-2024-1071](https://github.com/gbrsh/CVE-2024-1071) +- [Trackflaw/CVE-2024-1071-Docker](https://github.com/Trackflaw/CVE-2024-1071-Docker) ### CVE-2024-1208 (2024-02-05) @@ -4470,6 +4471,27 @@ - [wushigudan/CVE-2023-33517](https://github.com/wushigudan/CVE-2023-33517) +### CVE-2023-33565 (2023-06-23) + +ROS2 (Robot Operating System 2) Foxy Fitzroy ROS_VERSION=2 and ROS_PYTHON_VERSION=3 are vulnerable to Denial-of-Service (DoS) attacks. A malicious user potentially exploited the vulnerability remotely and crashed the ROS2 nodes. + + +- [yashpatelphd/CVE-2023-33565](https://github.com/yashpatelphd/CVE-2023-33565) + +### CVE-2023-33566 (2023-06-27) + +An unauthorized node injection vulnerability has been identified in ROS2 Foxy Fitzroy versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3. This vulnerability could allow a malicious user to inject malicious ROS2 nodes into the system remotely. Once injected, these nodes could disrupt the normal operations of the system or cause other potentially harmful behavior. + + +- [yashpatelphd/CVE-2023-33566](https://github.com/yashpatelphd/CVE-2023-33566) + +### CVE-2023-33567 (2023-06-27) + +An unauthorized access vulnerability has been discovered in ROS2 Foxy Fitzroy versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3. This vulnerability could potentially allow a malicious user to gain unauthorized access to multiple ROS2 nodes remotely. Unauthorized access to these nodes could result in compromised system integrity, the execution of arbitrary commands, and disclosure of sensitive information. + + +- [yashpatelphd/CVE-2023-33567](https://github.com/yashpatelphd/CVE-2023-33567) + ### CVE-2023-33592 (2023-06-28) Lost and Found Information System v1.0 was discovered to contain a SQL injection vulnerability via the component /php-lfis/admin/?page=system_info/contact_information. @@ -6800,6 +6822,7 @@ - [pentestfunctions/BlueDucky](https://github.com/pentestfunctions/BlueDucky) - [Eason-zz/BluetoothDucky](https://github.com/Eason-zz/BluetoothDucky) - [jjjjjjjj987/cve-2023-45866-py](https://github.com/jjjjjjjj987/cve-2023-45866-py) +- [R4HUL-INDIAN/Blue0DAY](https://github.com/R4HUL-INDIAN/Blue0DAY) ### CVE-2023-45966 (2023-10-23) @@ -7720,6 +7743,62 @@ - [risuxx/CVE-2023-51127](https://github.com/risuxx/CVE-2023-51127) +### CVE-2023-51197 (2024-01-30) + +An issue discovered in shell command execution in ROS2 (Robot Operating System 2) Foxy Fitzroy, with ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows an attacker to run arbitrary commands and cause other impacts. + + +- [yashpatelphd/CVE-2023-51197](https://github.com/yashpatelphd/CVE-2023-51197) + +### CVE-2023-51198 (2024-01-30) + +An issue in the permission and access control components within ROS2 Foxy Fitzroy ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to gain escalate privileges. + + +- [yashpatelphd/CVE-2023-51198](https://github.com/yashpatelphd/CVE-2023-51198) + +### CVE-2023-51199 (2024-01-23) + +Buffer Overflow vulnerability in ROS2 Foxy Fitzroy ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to run arbitrary code or cause a denial of service via improper handling of arrays or strings. + + +- [yashpatelphd/CVE-2023-51199](https://github.com/yashpatelphd/CVE-2023-51199) + +### CVE-2023-51200 (2024-01-23) + +An issue in the default configurations of ROS2 Foxy Fitzroy ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows unauthenticated attackers to authenticate using default credentials. + + +- [yashpatelphd/CVE-2023-51200](https://github.com/yashpatelphd/CVE-2023-51200) + +### CVE-2023-51201 (2024-01-23) + +Cleartext Transmission issue in ROS2 (Robot Operating System 2) Foxy Fitzroy, with ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to access sensitive information via a man-in-the-middle attack. + + +- [yashpatelphd/CVE-2023-51201](https://github.com/yashpatelphd/CVE-2023-51201) + +### CVE-2023-51202 (2024-01-30) + +OS command injection vulnerability in command processing or system call componentsROS2 (Robot Operating System 2) Foxy Fitzroy, with ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to run arbitrary commands. + + +- [yashpatelphd/CVE-2023-51202](https://github.com/yashpatelphd/CVE-2023-51202) + +### CVE-2023-51204 (2024-01-30) + +Insecure deserialization in ROS2 Foxy Fitzroy ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to execute arbitrary code via a crafted input. + + +- [yashpatelphd/CVE-2023-51204](https://github.com/yashpatelphd/CVE-2023-51204) + +### CVE-2023-51208 (2024-01-23) + +An Arbitrary File Upload vulnerability in ROS2 Foxy Fitzroy ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to run arbitrary code and cause other impacts via upload of crafted file. + + +- [yashpatelphd/CVE-2023-51208](https://github.com/yashpatelphd/CVE-2023-51208) + ### CVE-2023-51214 - [chandraprarikraj/CVE-2023-51214](https://github.com/chandraprarikraj/CVE-2023-51214) @@ -21525,6 +21604,7 @@ - [Ajomix/CVE-2020-0796](https://github.com/Ajomix/CVE-2020-0796) - [Vladshambaryan/https-github.com-jamf-CVE-2020-0796-RCE-POC](https://github.com/Vladshambaryan/https-github.com-jamf-CVE-2020-0796-RCE-POC) - [hungdnvp/POC-CVE-2020-0796](https://github.com/hungdnvp/POC-CVE-2020-0796) +- [AdamSonov/smbGhostCVE-2020-0796](https://github.com/AdamSonov/smbGhostCVE-2020-0796) ### CVE-2020-0799 (2020-03-12) @@ -22236,7 +22316,6 @@ - [dead5nd/config-demo](https://github.com/dead5nd/config-demo) - [osamahamad/CVE-2020-5410-POC](https://github.com/osamahamad/CVE-2020-5410-POC) -- [thelostworldFree/SpringCloud-Config-CVE-2020-5410](https://github.com/thelostworldFree/SpringCloud-Config-CVE-2020-5410) ### CVE-2020-5421 (2020-09-18)