diff --git a/2015/CVE-2015-9235.json b/2015/CVE-2015-9235.json index 02bc444ff9..66b08bcf79 100644 --- a/2015/CVE-2015-9235.json +++ b/2015/CVE-2015-9235.json @@ -88,10 +88,10 @@ "description": "针对JWT渗透开发的漏洞验证\/密钥爆破工具,针对CVE-2015-9235\/未验证签名攻击\/CVE-2016-10555\/CVE-2018-0114\/CVE-2020-28042的结果生成用于FUZZ,也可使用字典\/字符枚举(包括JJWT)的方式进行爆破", "fork": false, "created_at": "2025-01-27T14:23:31Z", - "updated_at": "2025-01-28T05:52:27Z", - "pushed_at": "2025-01-28T05:52:24Z", - "stargazers_count": 0, - "watchers_count": 0, + "updated_at": "2025-01-28T09:46:42Z", + "pushed_at": "2025-01-28T07:36:12Z", + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -100,7 +100,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 6, "score": 0, "subscribers_count": 0 } diff --git a/2016/CVE-2016-10555.json b/2016/CVE-2016-10555.json index 4da069c5b8..da51195a73 100644 --- a/2016/CVE-2016-10555.json +++ b/2016/CVE-2016-10555.json @@ -76,10 +76,10 @@ "description": "针对JWT渗透开发的漏洞验证\/密钥爆破工具,针对CVE-2015-9235\/未验证签名攻击\/CVE-2016-10555\/CVE-2018-0114\/CVE-2020-28042的结果生成用于FUZZ,也可使用字典\/字符枚举(包括JJWT)的方式进行爆破", "fork": false, "created_at": "2025-01-27T14:23:31Z", - "updated_at": "2025-01-28T05:52:27Z", - "pushed_at": "2025-01-28T05:52:24Z", - "stargazers_count": 0, - "watchers_count": 0, + "updated_at": "2025-01-28T09:46:42Z", + "pushed_at": "2025-01-28T07:36:12Z", + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 6, "score": 0, "subscribers_count": 0 } diff --git a/2017/CVE-2017-0199.json b/2017/CVE-2017-0199.json index f0c2073a4b..2ffcda6091 100644 --- a/2017/CVE-2017-0199.json +++ b/2017/CVE-2017-0199.json @@ -81,13 +81,13 @@ "stargazers_count": 726, "watchers_count": 726, "has_discussions": false, - "forks_count": 260, + "forks_count": 259, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 260, + "forks": 259, "watchers": 726, "score": 0, "subscribers_count": 46 diff --git a/2017/CVE-2017-11882.json b/2017/CVE-2017-11882.json index 25d9d870d4..1e8d41f53d 100644 --- a/2017/CVE-2017-11882.json +++ b/2017/CVE-2017-11882.json @@ -50,13 +50,13 @@ "stargazers_count": 493, "watchers_count": 493, "has_discussions": false, - "forks_count": 182, + "forks_count": 181, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 182, + "forks": 181, "watchers": 493, "score": 0, "subscribers_count": 39 diff --git a/2017/CVE-2017-8759.json b/2017/CVE-2017-8759.json index cafb21e867..601a3c40b7 100644 --- a/2017/CVE-2017-8759.json +++ b/2017/CVE-2017-8759.json @@ -210,13 +210,13 @@ "stargazers_count": 318, "watchers_count": 318, "has_discussions": false, - "forks_count": 109, + "forks_count": 108, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 109, + "forks": 108, "watchers": 318, "score": 0, "subscribers_count": 24 diff --git a/2018/CVE-2018-0114.json b/2018/CVE-2018-0114.json index f0bc0b8221..76ec281111 100644 --- a/2018/CVE-2018-0114.json +++ b/2018/CVE-2018-0114.json @@ -324,10 +324,10 @@ "description": "针对JWT渗透开发的漏洞验证\/密钥爆破工具,针对CVE-2015-9235\/未验证签名攻击\/CVE-2016-10555\/CVE-2018-0114\/CVE-2020-28042的结果生成用于FUZZ,也可使用字典\/字符枚举(包括JJWT)的方式进行爆破", "fork": false, "created_at": "2025-01-27T14:23:31Z", - "updated_at": "2025-01-28T05:52:27Z", - "pushed_at": "2025-01-28T05:52:24Z", - "stargazers_count": 0, - "watchers_count": 0, + "updated_at": "2025-01-28T09:46:42Z", + "pushed_at": "2025-01-28T07:36:12Z", + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -336,7 +336,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 6, "score": 0, "subscribers_count": 0 } diff --git a/2018/CVE-2018-17246.json b/2018/CVE-2018-17246.json index 2b335b7499..47ef3cbd59 100644 --- a/2018/CVE-2018-17246.json +++ b/2018/CVE-2018-17246.json @@ -14,10 +14,10 @@ "description": "CVE-2018-17246 - Kibana LFI < 6.4.3 & 5.6.13", "fork": false, "created_at": "2019-03-08T20:06:15Z", - "updated_at": "2025-01-28T00:04:46Z", + "updated_at": "2025-01-28T07:59:55Z", "pushed_at": "2019-10-26T13:28:34Z", - "stargazers_count": 60, - "watchers_count": 60, + "stargazers_count": 61, + "watchers_count": 61, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 15, - "watchers": 60, + "watchers": 61, "score": 0, "subscribers_count": 4 } diff --git a/2019/CVE-2019-19781.json b/2019/CVE-2019-19781.json index ff0482ebca..efb8ba1fdb 100644 --- a/2019/CVE-2019-19781.json +++ b/2019/CVE-2019-19781.json @@ -814,10 +814,10 @@ "description": "Indicator of Compromise Scanner for CVE-2019-19781", "fork": false, "created_at": "2020-01-21T15:20:25Z", - "updated_at": "2024-08-05T03:06:48Z", + "updated_at": "2025-01-28T07:15:50Z", "pushed_at": "2020-03-25T05:07:43Z", - "stargazers_count": 92, - "watchers_count": 92, + "stargazers_count": 93, + "watchers_count": 93, "has_discussions": false, "forks_count": 25, "allow_forking": true, @@ -826,7 +826,7 @@ "topics": [], "visibility": "public", "forks": 25, - "watchers": 92, + "watchers": 93, "score": 0, "subscribers_count": 14 }, diff --git a/2019/CVE-2019-2215.json b/2019/CVE-2019-2215.json index 452babdbd7..b4c6dac188 100644 --- a/2019/CVE-2019-2215.json +++ b/2019/CVE-2019-2215.json @@ -336,10 +336,10 @@ "description": "CVE-2019-2215", "fork": false, "created_at": "2021-05-07T16:48:40Z", - "updated_at": "2023-11-06T16:51:26Z", + "updated_at": "2025-01-28T07:34:24Z", "pushed_at": "2021-06-30T15:55:46Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -348,7 +348,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 }, diff --git a/2020/CVE-2020-10136.json b/2020/CVE-2020-10136.json index 5fde234d72..c542883d9d 100644 --- a/2020/CVE-2020-10136.json +++ b/2020/CVE-2020-10136.json @@ -61,8 +61,8 @@ "description": "Scanner and attack suite for hosts that forward unauthenticated packets via IPIP and GRE protocols. (CVE-2020-10136 CVE-2024-7595)", "fork": false, "created_at": "2025-01-23T20:21:00Z", - "updated_at": "2025-01-28T06:05:58Z", - "pushed_at": "2025-01-28T06:05:54Z", + "updated_at": "2025-01-28T12:09:55Z", + "pushed_at": "2025-01-28T12:09:52Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2020/CVE-2020-25223.json b/2020/CVE-2020-25223.json index aa6377546e..39ce4230ac 100644 --- a/2020/CVE-2020-25223.json +++ b/2020/CVE-2020-25223.json @@ -60,41 +60,5 @@ "watchers": 2, "score": 0, "subscribers_count": 1 - }, - { - "id": 912256328, - "name": "poc-cve-2020-25223", - "full_name": "gh-2025-02\/poc-cve-2020-25223", - "owner": { - "login": "gh-2025-02", - "id": 193763189, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/193763189?v=4", - "html_url": "https:\/\/github.com\/gh-2025-02", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/gh-2025-02\/poc-cve-2020-25223", - "description": "poc-cve-2020-25223", - "fork": false, - "created_at": "2025-01-05T03:34:33Z", - "updated_at": "2025-01-05T17:28:34Z", - "pushed_at": "2025-01-05T03:40:12Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2020-25223", - "poc", - "poc-cve-2020-25223", - "rce" - ], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2020/CVE-2020-28042.json b/2020/CVE-2020-28042.json index 4a5d2fe8e7..419cfb8efc 100644 --- a/2020/CVE-2020-28042.json +++ b/2020/CVE-2020-28042.json @@ -14,10 +14,10 @@ "description": "针对JWT渗透开发的漏洞验证\/密钥爆破工具,针对CVE-2015-9235\/未验证签名攻击\/CVE-2016-10555\/CVE-2018-0114\/CVE-2020-28042的结果生成用于FUZZ,也可使用字典\/字符枚举(包括JJWT)的方式进行爆破", "fork": false, "created_at": "2025-01-27T14:23:31Z", - "updated_at": "2025-01-28T05:52:27Z", - "pushed_at": "2025-01-28T05:52:24Z", - "stargazers_count": 0, - "watchers_count": 0, + "updated_at": "2025-01-28T09:46:42Z", + "pushed_at": "2025-01-28T07:36:12Z", + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 6, "score": 0, "subscribers_count": 1 } diff --git a/2021/CVE-2021-21123.json b/2021/CVE-2021-21123.json index 076fb6d77c..e16fe663a7 100644 --- a/2021/CVE-2021-21123.json +++ b/2021/CVE-2021-21123.json @@ -14,10 +14,10 @@ "description": "🐱‍💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2021-21123 and 5 more...", "fork": false, "created_at": "2021-03-22T11:53:57Z", - "updated_at": "2025-01-06T18:55:22Z", + "updated_at": "2025-01-28T11:37:58Z", "pushed_at": "2021-03-22T18:24:20Z", - "stargazers_count": 164, - "watchers_count": 164, + "stargazers_count": 165, + "watchers_count": 165, "has_discussions": false, "forks_count": 26, "allow_forking": true, @@ -41,7 +41,7 @@ ], "visibility": "public", "forks": 26, - "watchers": 164, + "watchers": 165, "score": 0, "subscribers_count": 4 } diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json index e35fed61c9..995105b1ce 100644 --- a/2021/CVE-2021-40444.json +++ b/2021/CVE-2021-40444.json @@ -231,10 +231,10 @@ "description": "CVE-2021-40444 PoC", "fork": false, "created_at": "2021-09-10T16:55:53Z", - "updated_at": "2025-01-27T21:50:44Z", + "updated_at": "2025-01-28T11:04:09Z", "pushed_at": "2021-12-25T18:31:02Z", - "stargazers_count": 1610, - "watchers_count": 1610, + "stargazers_count": 1611, + "watchers_count": 1611, "has_discussions": false, "forks_count": 483, "allow_forking": true, @@ -243,7 +243,7 @@ "topics": [], "visibility": "public", "forks": 483, - "watchers": 1610, + "watchers": 1611, "score": 0, "subscribers_count": 28 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 5cf21ce776..96566f4a96 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -884,10 +884,10 @@ "description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks", "fork": false, "created_at": "2021-12-10T22:35:00Z", - "updated_at": "2025-01-24T09:23:18Z", + "updated_at": "2025-01-28T11:38:46Z", "pushed_at": "2022-01-15T16:18:44Z", - "stargazers_count": 937, - "watchers_count": 937, + "stargazers_count": 938, + "watchers_count": 938, "has_discussions": false, "forks_count": 141, "allow_forking": true, @@ -916,7 +916,7 @@ ], "visibility": "public", "forks": 141, - "watchers": 937, + "watchers": 938, "score": 0, "subscribers_count": 25 }, diff --git a/2022/CVE-2022-0337.json b/2022/CVE-2022-0337.json index ca7ee715dc..495494f60c 100644 --- a/2022/CVE-2022-0337.json +++ b/2022/CVE-2022-0337.json @@ -14,10 +14,10 @@ "description": "🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337", "fork": false, "created_at": "2022-03-19T08:10:46Z", - "updated_at": "2025-01-08T10:55:34Z", + "updated_at": "2025-01-28T11:38:51Z", "pushed_at": "2022-09-04T17:28:56Z", - "stargazers_count": 329, - "watchers_count": 329, + "stargazers_count": 330, + "watchers_count": 330, "has_discussions": false, "forks_count": 34, "allow_forking": true, @@ -42,7 +42,7 @@ ], "visibility": "public", "forks": 34, - "watchers": 329, + "watchers": 330, "score": 0, "subscribers_count": 6 }, diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index 0383d4d6c1..49cd4effa6 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -634,10 +634,10 @@ "description": "Atlassian Confluence 远程代码执行漏洞(CVE-2022-26134)", "fork": false, "created_at": "2022-06-07T06:57:02Z", - "updated_at": "2024-08-12T20:23:55Z", + "updated_at": "2025-01-28T12:11:34Z", "pushed_at": "2022-06-30T01:07:17Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -646,7 +646,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 }, diff --git a/2022/CVE-2022-30591.json b/2022/CVE-2022-30591.json index 4961f3a239..ec0894c8ac 100644 --- a/2022/CVE-2022-30591.json +++ b/2022/CVE-2022-30591.json @@ -14,10 +14,10 @@ "description": "Attacks against QUIC (CVE-2022-30591)", "fork": false, "created_at": "2022-06-30T18:25:23Z", - "updated_at": "2024-12-21T09:02:33Z", + "updated_at": "2025-01-28T11:46:49Z", "pushed_at": "2022-12-31T01:55:15Z", - "stargazers_count": 21, - "watchers_count": 21, + "stargazers_count": 22, + "watchers_count": 22, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 8, - "watchers": 21, + "watchers": 22, "score": 0, "subscribers_count": 1 } diff --git a/2022/CVE-2022-39952.json b/2022/CVE-2022-39952.json index 65ac9a8b94..941d649621 100644 --- a/2022/CVE-2022-39952.json +++ b/2022/CVE-2022-39952.json @@ -14,10 +14,10 @@ "description": "POC for CVE-2022-39952", "fork": false, "created_at": "2023-02-20T15:12:33Z", - "updated_at": "2024-12-03T03:14:06Z", + "updated_at": "2025-01-28T08:46:17Z", "pushed_at": "2023-02-25T08:52:03Z", - "stargazers_count": 265, - "watchers_count": 265, + "stargazers_count": 266, + "watchers_count": 266, "has_discussions": false, "forks_count": 53, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 53, - "watchers": 265, + "watchers": 266, "score": 0, "subscribers_count": 8 }, diff --git a/2022/CVE-2022-40684.json b/2022/CVE-2022-40684.json index 04b1176c68..566bdd14d8 100644 --- a/2022/CVE-2022-40684.json +++ b/2022/CVE-2022-40684.json @@ -743,10 +743,10 @@ "description": "Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group", "fork": false, "created_at": "2025-01-16T06:54:15Z", - "updated_at": "2025-01-28T06:10:44Z", + "updated_at": "2025-01-28T10:02:25Z", "pushed_at": "2025-01-16T09:56:36Z", - "stargazers_count": 78, - "watchers_count": 78, + "stargazers_count": 79, + "watchers_count": 79, "has_discussions": false, "forks_count": 19, "allow_forking": true, @@ -755,7 +755,7 @@ "topics": [], "visibility": "public", "forks": 19, - "watchers": 78, + "watchers": 79, "score": 0, "subscribers_count": 7 }, @@ -790,41 +790,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 918683582, - "name": "fortigate-belsen-leak", - "full_name": "AKboss1221\/fortigate-belsen-leak", - "owner": { - "login": "AKboss1221", - "id": 58637001, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58637001?v=4", - "html_url": "https:\/\/github.com\/AKboss1221", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/AKboss1221\/fortigate-belsen-leak", - "description": "Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group", - "fork": false, - "created_at": "2025-01-18T15:32:21Z", - "updated_at": "2025-01-28T06:03:23Z", - "pushed_at": "2025-01-28T06:03:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "belsen", - "fortigate", - "leak" - ], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 921262750, "name": "Fortigate-Belsen-Leak-Dump-CVE-2022-40684-", diff --git a/2023/CVE-2023-21674.json b/2023/CVE-2023-21674.json index 81b9272069..796216df88 100644 --- a/2023/CVE-2023-21674.json +++ b/2023/CVE-2023-21674.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2024-03-07T05:43:48Z", - "updated_at": "2025-01-23T03:50:49Z", + "updated_at": "2025-01-28T08:28:23Z", "pushed_at": "2024-04-05T00:05:44Z", - "stargazers_count": 30, - "watchers_count": 30, + "stargazers_count": 31, + "watchers_count": 31, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 30, + "watchers": 31, "score": 0, "subscribers_count": 2 } diff --git a/2023/CVE-2023-22515.json b/2023/CVE-2023-22515.json index 9a2119c842..aae34477f9 100644 --- a/2023/CVE-2023-22515.json +++ b/2023/CVE-2023-22515.json @@ -221,10 +221,10 @@ "description": "Confluence Data Center & Server 权限提升漏洞 Exploit", "fork": false, "created_at": "2023-10-13T05:18:54Z", - "updated_at": "2023-10-16T05:58:42Z", + "updated_at": "2025-01-28T12:18:38Z", "pushed_at": "2023-10-13T05:21:37Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -233,7 +233,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 5, + "watchers": 6, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-22527.json b/2023/CVE-2023-22527.json index 05df4cb0fc..9f4dd14295 100644 --- a/2023/CVE-2023-22527.json +++ b/2023/CVE-2023-22527.json @@ -606,19 +606,19 @@ "description": "confluence CVE-2023-22527 漏洞利用工具,支持冰蝎\/哥斯拉内存马注入,支持设置 http 代理", "fork": false, "created_at": "2024-02-26T02:34:44Z", - "updated_at": "2025-01-13T08:27:08Z", + "updated_at": "2025-01-28T12:13:37Z", "pushed_at": "2024-04-24T02:34:16Z", - "stargazers_count": 39, - "watchers_count": 39, + "stargazers_count": 40, + "watchers_count": 40, "has_discussions": false, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, - "watchers": 39, + "forks": 2, + "watchers": 40, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-24055.json b/2023/CVE-2023-24055.json index 519a67faf3..9c06564069 100644 --- a/2023/CVE-2023-24055.json +++ b/2023/CVE-2023-24055.json @@ -111,10 +111,10 @@ "description": "CVE-2023-24055 POC written in PowerShell.", "fork": false, "created_at": "2023-01-30T13:22:22Z", - "updated_at": "2024-08-12T20:29:34Z", + "updated_at": "2025-01-28T08:56:36Z", "pushed_at": "2023-02-04T19:44:43Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -129,7 +129,7 @@ ], "visibility": "public", "forks": 2, - "watchers": 5, + "watchers": 6, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-36844.json b/2023/CVE-2023-36844.json index 3dbd1b435d..84b150ad86 100644 --- a/2023/CVE-2023-36844.json +++ b/2023/CVE-2023-36844.json @@ -81,13 +81,13 @@ "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, - "forks_count": 2, + "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 2, + "forks": 3, "watchers": 4, "score": 0, "subscribers_count": 1 diff --git a/2023/CVE-2023-41425.json b/2023/CVE-2023-41425.json index 916a76693b..18d079aa73 100644 --- a/2023/CVE-2023-41425.json +++ b/2023/CVE-2023-41425.json @@ -306,10 +306,10 @@ "description": "Xss injection, WonderCMS 3.2.0 -3.4.2 ", "fork": false, "created_at": "2024-11-24T17:39:45Z", - "updated_at": "2025-01-19T19:40:02Z", + "updated_at": "2025-01-28T09:12:36Z", "pushed_at": "2025-01-19T19:34:50Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -318,7 +318,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-0044.json b/2024/CVE-2024-0044.json index dad3355358..7b5aa792c6 100644 --- a/2024/CVE-2024-0044.json +++ b/2024/CVE-2024-0044.json @@ -262,7 +262,7 @@ "description": "CVE-2024-0044", "fork": false, "created_at": "2024-08-19T02:51:14Z", - "updated_at": "2025-01-27T19:50:40Z", + "updated_at": "2025-01-28T12:26:33Z", "pushed_at": "2024-08-24T06:32:58Z", "stargazers_count": 8, "watchers_count": 8, diff --git a/2024/CVE-2024-2961.json b/2024/CVE-2024-2961.json index 9f45ec83bd..a6aec2d7cb 100644 --- a/2024/CVE-2024-2961.json +++ b/2024/CVE-2024-2961.json @@ -76,10 +76,10 @@ "description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()", "fork": false, "created_at": "2024-05-27T08:30:06Z", - "updated_at": "2025-01-27T16:49:45Z", + "updated_at": "2025-01-28T10:08:00Z", "pushed_at": "2024-09-30T08:45:56Z", - "stargazers_count": 436, - "watchers_count": 436, + "stargazers_count": 438, + "watchers_count": 438, "has_discussions": false, "forks_count": 55, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 55, - "watchers": 436, + "watchers": 438, "score": 0, "subscribers_count": 8 }, diff --git a/2024/CVE-2024-38473.json b/2024/CVE-2024-38473.json index e73ac7ee86..3857d32afa 100644 --- a/2024/CVE-2024-38473.json +++ b/2024/CVE-2024-38473.json @@ -45,10 +45,10 @@ "description": "Nuclei template to detect Apache servers vulnerable to CVE-2024-38473", "fork": false, "created_at": "2024-08-23T14:39:31Z", - "updated_at": "2024-12-22T21:45:53Z", + "updated_at": "2025-01-28T10:34:20Z", "pushed_at": "2024-08-24T22:42:42Z", - "stargazers_count": 27, - "watchers_count": 27, + "stargazers_count": 28, + "watchers_count": 28, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 27, + "watchers": 28, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-40498.json b/2024/CVE-2024-40498.json index e1dae0a101..67e340eda7 100644 --- a/2024/CVE-2024-40498.json +++ b/2024/CVE-2024-40498.json @@ -11,10 +11,10 @@ "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Dirac231\/CVE-2024-40498", - "description": null, + "description": "Blind SQL Injection to RCE in a PHP open source application", "fork": false, "created_at": "2024-07-29T10:13:15Z", - "updated_at": "2024-07-29T10:18:44Z", + "updated_at": "2025-01-28T09:44:47Z", "pushed_at": "2024-07-29T10:18:41Z", "stargazers_count": 0, "watchers_count": 0, diff --git a/2024/CVE-2024-41570.json b/2024/CVE-2024-41570.json index c2a85be312..6fcdc18b9d 100644 --- a/2024/CVE-2024-41570.json +++ b/2024/CVE-2024-41570.json @@ -50,13 +50,13 @@ "stargazers_count": 13, "watchers_count": 13, "has_discussions": false, - "forks_count": 2, + "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 2, + "forks": 3, "watchers": 13, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-55591.json b/2024/CVE-2024-55591.json index 4744929af2..b7f650f766 100644 --- a/2024/CVE-2024-55591.json +++ b/2024/CVE-2024-55591.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2025-01-16T07:26:15Z", - "updated_at": "2025-01-25T09:34:26Z", + "updated_at": "2025-01-28T09:48:19Z", "pushed_at": "2025-01-16T08:58:49Z", - "stargazers_count": 54, - "watchers_count": 54, + "stargazers_count": 55, + "watchers_count": 55, "has_discussions": false, "forks_count": 12, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 12, - "watchers": 54, + "watchers": 55, "score": 0, "subscribers_count": 1 }, @@ -138,10 +138,10 @@ "description": "An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS and FortiProxy may allow a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.", "fork": false, "created_at": "2025-01-24T20:29:56Z", - "updated_at": "2025-01-27T21:22:53Z", - "pushed_at": "2025-01-27T21:22:50Z", - "stargazers_count": 0, - "watchers_count": 0, + "updated_at": "2025-01-28T12:25:54Z", + "pushed_at": "2025-01-28T12:21:43Z", + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -150,7 +150,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 2, "score": 0, "subscribers_count": 1 }, @@ -169,10 +169,10 @@ "description": "CVE-2024-55591 Opening CMD (Command Line Interface), Creating a Superuser, and Managing VPN Groups", "fork": false, "created_at": "2025-01-25T14:35:57Z", - "updated_at": "2025-01-26T17:43:42Z", + "updated_at": "2025-01-28T06:51:32Z", "pushed_at": "2025-01-26T17:43:39Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -181,7 +181,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 }, @@ -200,19 +200,19 @@ "description": null, "fork": false, "created_at": "2025-01-27T06:25:53Z", - "updated_at": "2025-01-28T04:10:50Z", + "updated_at": "2025-01-28T12:00:33Z", "pushed_at": "2025-01-27T19:11:46Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 19, + "watchers_count": 19, "has_discussions": false, - "forks_count": 2, + "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 2, - "watchers": 12, + "forks": 3, + "watchers": 19, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-7595.json b/2024/CVE-2024-7595.json index 4bb015aedb..540e318f80 100644 --- a/2024/CVE-2024-7595.json +++ b/2024/CVE-2024-7595.json @@ -61,8 +61,8 @@ "description": "Scanner and attack suite for hosts that forward unauthenticated packets via IPIP and GRE protocols. (CVE-2020-10136 CVE-2024-7595)", "fork": false, "created_at": "2025-01-23T20:21:00Z", - "updated_at": "2025-01-28T06:26:23Z", - "pushed_at": "2025-01-28T06:26:21Z", + "updated_at": "2025-01-28T12:30:28Z", + "pushed_at": "2025-01-28T12:30:25Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2025/CVE-2025-0282.json b/2025/CVE-2025-0282.json index 6658b6f7e1..0ca52057ec 100644 --- a/2025/CVE-2025-0282.json +++ b/2025/CVE-2025-0282.json @@ -215,5 +215,36 @@ "watchers": 0, "score": 0, "subscribers_count": 0 + }, + { + "id": 923420005, + "name": "CVE-2025-0282", + "full_name": "AdaniKamal\/CVE-2025-0282", + "owner": { + "login": "AdaniKamal", + "id": 44063862, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44063862?v=4", + "html_url": "https:\/\/github.com\/AdaniKamal", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/AdaniKamal\/CVE-2025-0282", + "description": "Ivanti Connect Secure, Policy Secure & ZTA Gateways - CVE-2025-0282", + "fork": false, + "created_at": "2025-01-28T07:56:05Z", + "updated_at": "2025-01-28T08:46:48Z", + "pushed_at": "2025-01-28T08:46:44Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2025/CVE-2025-0411.json b/2025/CVE-2025-0411.json index cf7a32e348..a2e8e3c40f 100644 --- a/2025/CVE-2025-0411.json +++ b/2025/CVE-2025-0411.json @@ -19,7 +19,7 @@ "stargazers_count": 73, "watchers_count": 73, "has_discussions": false, - "forks_count": 17, + "forks_count": 18, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -32,7 +32,7 @@ "poc" ], "visibility": "public", - "forks": 17, + "forks": 18, "watchers": 73, "score": 0, "subscribers_count": 0 @@ -52,8 +52,8 @@ "description": "This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.", "fork": false, "created_at": "2025-01-25T18:07:12Z", - "updated_at": "2025-01-28T06:26:45Z", - "pushed_at": "2025-01-28T06:26:42Z", + "updated_at": "2025-01-28T12:31:07Z", + "pushed_at": "2025-01-28T12:31:04Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, diff --git a/2025/CVE-2025-21298.json b/2025/CVE-2025-21298.json index e69ec6a858..4a684cd507 100644 --- a/2025/CVE-2025-21298.json +++ b/2025/CVE-2025-21298.json @@ -19,13 +19,13 @@ "stargazers_count": 56, "watchers_count": 56, "has_discussions": false, - "forks_count": 16, + "forks_count": 17, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 16, + "forks": 17, "watchers": 56, "score": 0, "subscribers_count": 0 diff --git a/README.md b/README.md index 432671cb8c..a1a80ec595 100644 --- a/README.md +++ b/README.md @@ -13,6 +13,7 @@ - [sfewer-r7/CVE-2025-0282](https://github.com/sfewer-r7/CVE-2025-0282) - [Hexastrike/Ivanti-Connect-Secure-Logs-Parser](https://github.com/Hexastrike/Ivanti-Connect-Secure-Logs-Parser) - [chiefchainer/CVE-2025-0282](https://github.com/chiefchainer/CVE-2025-0282) +- [AdaniKamal/CVE-2025-0282](https://github.com/AdaniKamal/CVE-2025-0282) ### CVE-2025-0411 (2025-01-25) @@ -22779,7 +22780,6 @@ - [Anthony1500/CVE-2022-40684](https://github.com/Anthony1500/CVE-2022-40684) - [arsolutioner/fortigate-belsen-leak](https://github.com/arsolutioner/fortigate-belsen-leak) - [Rofell0s/Fortigate-Leak-CVE-2022-40684](https://github.com/Rofell0s/Fortigate-Leak-CVE-2022-40684) -- [AKboss1221/fortigate-belsen-leak](https://github.com/AKboss1221/fortigate-belsen-leak) - [XalfiE/Fortigate-Belsen-Leak-Dump-CVE-2022-40684-](https://github.com/XalfiE/Fortigate-Belsen-Leak-Dump-CVE-2022-40684-) - [niklasmato/fortileak-01-2025-Be](https://github.com/niklasmato/fortileak-01-2025-Be) @@ -35219,7 +35219,6 @@ - [darrenmartyn/sophucked](https://github.com/darrenmartyn/sophucked) - [twentybel0w/CVE-2020-25223](https://github.com/twentybel0w/CVE-2020-25223) -- [gh-2025-02/poc-cve-2020-25223](https://github.com/gh-2025-02/poc-cve-2020-25223) ### CVE-2020-25265 (2020-12-02)