diff --git a/2014/CVE-2014-0224.json b/2014/CVE-2014-0224.json index ca3bc3afdf..7e5de00963 100644 --- a/2014/CVE-2014-0224.json +++ b/2014/CVE-2014-0224.json @@ -13,10 +13,10 @@ "description": "This script is designed for detection of vulnerable servers (CVE-2014-0224.) in a wide range of configurations. It attempts to negotiate using each affected protocol version (SSLv3, TLSv1, TLSv1.1, and TLSv1.2) advertising a comprehensive set of ciphers.", "fork": false, "created_at": "2014-06-12T04:44:13Z", - "updated_at": "2022-11-11T12:19:14Z", + "updated_at": "2023-03-04T14:40:23Z", "pushed_at": "2014-07-24T20:47:27Z", - "stargazers_count": 34, - "watchers_count": 34, + "stargazers_count": 35, + "watchers_count": 35, "has_discussions": false, "forks_count": 17, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 17, - "watchers": 34, + "watchers": 35, "score": 0 }, { diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 3ee1f8f53e..b7e6c1eda6 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-03-04T08:24:30Z", + "updated_at": "2023-03-04T15:37:19Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1633, - "watchers_count": 1633, + "stargazers_count": 1635, + "watchers_count": 1635, "has_discussions": false, "forks_count": 321, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 321, - "watchers": 1633, + "watchers": 1635, "score": 0 }, { diff --git a/2016/CVE-2016-5195.json b/2016/CVE-2016-5195.json index 21e30f2c02..3503570744 100644 --- a/2016/CVE-2016-5195.json +++ b/2016/CVE-2016-5195.json @@ -260,7 +260,7 @@ "stargazers_count": 272, "watchers_count": 272, "has_discussions": false, - "forks_count": 121, + "forks_count": 122, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -270,7 +270,7 @@ "dirtycow" ], "visibility": "public", - "forks": 121, + "forks": 122, "watchers": 272, "score": 0 }, diff --git a/2016/CVE-2016-9920.json b/2016/CVE-2016-9920.json index 21049f0623..53b58d0467 100644 --- a/2016/CVE-2016-9920.json +++ b/2016/CVE-2016-9920.json @@ -13,10 +13,10 @@ "description": "Roundcube 1.0.0 <= 1.2.2 Remote Code Execution exploit and vulnerable container", "fork": false, "created_at": "2017-01-06T17:55:44Z", - "updated_at": "2023-02-04T05:36:06Z", + "updated_at": "2023-03-04T12:57:21Z", "pushed_at": "2017-01-06T23:34:03Z", - "stargazers_count": 41, - "watchers_count": 41, + "stargazers_count": 42, + "watchers_count": 42, "has_discussions": false, "forks_count": 19, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 19, - "watchers": 41, + "watchers": 42, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 8f4c318679..b1d924a8f8 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -42,10 +42,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-03-04T08:24:30Z", + "updated_at": "2023-03-04T15:37:19Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1633, - "watchers_count": 1633, + "stargazers_count": 1635, + "watchers_count": 1635, "has_discussions": false, "forks_count": 321, "allow_forking": true, @@ -75,7 +75,7 @@ ], "visibility": "public", "forks": 321, - "watchers": 1633, + "watchers": 1635, "score": 0 }, { diff --git a/2017/CVE-2017-9506.json b/2017/CVE-2017-9506.json index 7fffbb589c..b67fd9fd54 100644 --- a/2017/CVE-2017-9506.json +++ b/2017/CVE-2017-9506.json @@ -13,10 +13,10 @@ "description": "CVE-2017-9506 - SSRF", "fork": false, "created_at": "2018-04-25T11:25:18Z", - "updated_at": "2023-01-10T18:09:37Z", + "updated_at": "2023-03-04T14:40:45Z", "pushed_at": "2022-02-14T22:00:28Z", - "stargazers_count": 170, - "watchers_count": 170, + "stargazers_count": 171, + "watchers_count": 171, "has_discussions": false, "forks_count": 50, "allow_forking": true, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 50, - "watchers": 170, + "watchers": 171, "score": 0 }, { diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index d8a1e714b5..0ecad0d89a 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -568,10 +568,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-03-04T08:24:30Z", + "updated_at": "2023-03-04T15:37:19Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1633, - "watchers_count": 1633, + "stargazers_count": 1635, + "watchers_count": 1635, "has_discussions": false, "forks_count": 321, "allow_forking": true, @@ -601,7 +601,7 @@ ], "visibility": "public", "forks": 321, - "watchers": 1633, + "watchers": 1635, "score": 0 }, { diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 14d48db901..927c20cdea 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -42,10 +42,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2023-03-03T23:04:41Z", + "updated_at": "2023-03-04T15:27:20Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3686, - "watchers_count": 3686, + "stargazers_count": 3687, + "watchers_count": 3687, "has_discussions": false, "forks_count": 1059, "allow_forking": true, @@ -74,7 +74,7 @@ ], "visibility": "public", "forks": 1059, - "watchers": 3686, + "watchers": 3687, "score": 0 }, { diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 114ed6da5c..4e68df56fd 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -187,10 +187,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-03-04T08:24:30Z", + "updated_at": "2023-03-04T15:37:19Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1633, - "watchers_count": 1633, + "stargazers_count": 1635, + "watchers_count": 1635, "has_discussions": false, "forks_count": 321, "allow_forking": true, @@ -220,7 +220,7 @@ ], "visibility": "public", "forks": 321, - "watchers": 1633, + "watchers": 1635, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-10560.json b/2020/CVE-2020-10560.json index 8624c560aa..e7353fc9f4 100644 --- a/2020/CVE-2020-10560.json +++ b/2020/CVE-2020-10560.json @@ -43,7 +43,7 @@ "fork": false, "created_at": "2020-03-28T22:09:39Z", "updated_at": "2022-11-09T18:06:56Z", - "pushed_at": "2023-02-24T17:24:03Z", + "pushed_at": "2023-03-04T16:37:59Z", "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 9f181ff110..2e93e5e586 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,10 +13,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2023-03-03T23:04:41Z", + "updated_at": "2023-03-04T15:27:20Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3686, - "watchers_count": 3686, + "stargazers_count": 3687, + "watchers_count": 3687, "has_discussions": false, "forks_count": 1059, "allow_forking": true, @@ -45,7 +45,7 @@ ], "visibility": "public", "forks": 1059, - "watchers": 3686, + "watchers": 3687, "score": 0 }, { diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index c085f919a3..45fbddd1eb 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-03-04T08:24:30Z", + "updated_at": "2023-03-04T15:37:19Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1633, - "watchers_count": 1633, + "stargazers_count": 1635, + "watchers_count": 1635, "has_discussions": false, "forks_count": 321, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 321, - "watchers": 1633, + "watchers": 1635, "score": 0 }, { diff --git a/2020/CVE-2020-2555.json b/2020/CVE-2020-2555.json index 31417ed5cc..ba48f674f7 100644 --- a/2020/CVE-2020-2555.json +++ b/2020/CVE-2020-2555.json @@ -71,10 +71,10 @@ "description": "Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE", "fork": false, "created_at": "2020-03-07T18:58:09Z", - "updated_at": "2023-02-23T12:45:49Z", + "updated_at": "2023-03-04T13:40:15Z", "pushed_at": "2022-12-15T00:36:55Z", - "stargazers_count": 173, - "watchers_count": 173, + "stargazers_count": 174, + "watchers_count": 174, "has_discussions": false, "forks_count": 54, "allow_forking": true, @@ -83,7 +83,7 @@ "topics": [], "visibility": "public", "forks": 54, - "watchers": 173, + "watchers": 174, "score": 0 }, { diff --git a/2020/CVE-2020-7247.json b/2020/CVE-2020-7247.json index aa37feffac..1c53b64bab 100644 --- a/2020/CVE-2020-7247.json +++ b/2020/CVE-2020-7247.json @@ -250,10 +250,10 @@ "description": "CVE-2020-7247 Remote Code Execution POC", "fork": false, "created_at": "2023-03-03T07:21:06Z", - "updated_at": "2023-03-04T11:08:31Z", + "updated_at": "2023-03-04T12:35:47Z", "pushed_at": "2023-03-04T11:03:13Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -266,7 +266,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json index 149bea3adf..7da86da0c3 100644 --- a/2021/CVE-2021-3129.json +++ b/2021/CVE-2021-3129.json @@ -498,5 +498,34 @@ "forks": 0, "watchers": 2, "score": 0 + }, + { + "id": 609599518, + "name": "CVE-2021-3129-exp", + "full_name": "ajisai-babu\/CVE-2021-3129-exp", + "owner": { + "login": "ajisai-babu", + "id": 30685957, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30685957?v=4", + "html_url": "https:\/\/github.com\/ajisai-babu" + }, + "html_url": "https:\/\/github.com\/ajisai-babu\/CVE-2021-3129-exp", + "description": "Laravel Debug mode RCE漏洞(CVE-2021-3129)poc \/ exp", + "fork": false, + "created_at": "2023-03-04T17:04:38Z", + "updated_at": "2023-03-04T17:14:12Z", + "pushed_at": "2023-03-04T17:10:43Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-39670.json b/2021/CVE-2021-39670.json index 89ffe2a418..177eb1ea6e 100644 --- a/2021/CVE-2021-39670.json +++ b/2021/CVE-2021-39670.json @@ -13,7 +13,7 @@ "description": "Exploit app for CVE-2021-39670 and CVE-2021-39690, two permanent denial-of-service vulnerabilities in Android's wallpaper system", "fork": false, "created_at": "2023-02-23T06:36:47Z", - "updated_at": "2023-03-03T18:08:18Z", + "updated_at": "2023-03-04T18:22:34Z", "pushed_at": "2023-03-03T17:39:43Z", "stargazers_count": 9, "watchers_count": 9, diff --git a/2021/CVE-2021-40449.json b/2021/CVE-2021-40449.json index e01b81ba66..5c58153c71 100644 --- a/2021/CVE-2021-40449.json +++ b/2021/CVE-2021-40449.json @@ -196,13 +196,13 @@ "stargazers_count": 72, "watchers_count": 72, "has_discussions": false, - "forks_count": 29, + "forks_count": 28, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 29, + "forks": 28, "watchers": 72, "score": 0 } diff --git a/2021/CVE-2021-4045.json b/2021/CVE-2021-4045.json index d7cda282ed..33d6cd5372 100644 --- a/2021/CVE-2021-4045.json +++ b/2021/CVE-2021-4045.json @@ -13,10 +13,10 @@ "description": "Exploit for command injection vulnerability found in uhttpd binary from TP-Link Tapo c200 IP camera", "fork": false, "created_at": "2021-11-15T14:48:14Z", - "updated_at": "2023-03-03T21:12:14Z", + "updated_at": "2023-03-04T13:58:43Z", "pushed_at": "2023-01-01T21:12:20Z", - "stargazers_count": 25, - "watchers_count": 25, + "stargazers_count": 26, + "watchers_count": 26, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 6, - "watchers": 25, + "watchers": 26, "score": 0 }, { diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index db1d333834..2cb34d4557 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -10241,7 +10241,7 @@ "fork": false, "created_at": "2022-01-03T04:36:41Z", "updated_at": "2022-01-09T19:59:25Z", - "pushed_at": "2023-02-07T03:53:52Z", + "pushed_at": "2023-03-04T15:30:47Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-20494.json b/2022/CVE-2022-20494.json index 23bea55f53..ab877c2d68 100644 --- a/2022/CVE-2022-20494.json +++ b/2022/CVE-2022-20494.json @@ -13,19 +13,19 @@ "description": "Exploit app for CVE-2022-20494, a high severity permanent denial-of-service vulnerability that leverages Android's DND (Do not disturb) feature", "fork": false, "created_at": "2023-03-03T17:54:34Z", - "updated_at": "2023-03-04T07:49:48Z", + "updated_at": "2023-03-04T18:22:31Z", "pushed_at": "2023-03-03T18:11:07Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 9, + "watchers_count": 9, "has_discussions": false, - "forks_count": 3, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 3, - "watchers": 4, + "forks": 4, + "watchers": 9, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-21894.json b/2022/CVE-2022-21894.json index eeb50842c1..16027d7ee8 100644 --- a/2022/CVE-2022-21894.json +++ b/2022/CVE-2022-21894.json @@ -13,12 +13,12 @@ "description": "baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability", "fork": false, "created_at": "2022-08-09T15:53:48Z", - "updated_at": "2023-03-04T10:42:38Z", + "updated_at": "2023-03-04T17:48:59Z", "pushed_at": "2023-03-02T19:43:36Z", - "stargazers_count": 139, - "watchers_count": 139, + "stargazers_count": 144, + "watchers_count": 144, "has_discussions": false, - "forks_count": 29, + "forks_count": 30, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -30,8 +30,8 @@ "windows-boot" ], "visibility": "public", - "forks": 29, - "watchers": 139, + "forks": 30, + "watchers": 144, "score": 0 }, { diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json index 3aa5ca3cd8..ac0d10f8ec 100644 --- a/2022/CVE-2022-22954.json +++ b/2022/CVE-2022-22954.json @@ -13,10 +13,10 @@ "description": "POC for VMWARE CVE-2022-22954", "fork": false, "created_at": "2022-04-11T13:59:23Z", - "updated_at": "2023-02-02T00:58:48Z", + "updated_at": "2023-03-04T14:50:29Z", "pushed_at": "2022-04-13T06:15:11Z", - "stargazers_count": 286, - "watchers_count": 286, + "stargazers_count": 287, + "watchers_count": 287, "has_discussions": false, "forks_count": 52, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 52, - "watchers": 286, + "watchers": 287, "score": 0 }, { diff --git a/2022/CVE-2022-26809.json b/2022/CVE-2022-26809.json index 8e1cee92d5..fae5254931 100644 --- a/2022/CVE-2022-26809.json +++ b/2022/CVE-2022-26809.json @@ -73,10 +73,10 @@ "description": null, "fork": false, "created_at": "2022-04-14T08:21:10Z", - "updated_at": "2023-01-16T14:36:24Z", + "updated_at": "2023-03-04T13:56:58Z", "pushed_at": "2022-04-14T08:23:59Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 7, + "watchers": 8, "score": 0 }, { diff --git a/2022/CVE-2022-32548.json b/2022/CVE-2022-32548.json new file mode 100644 index 0000000000..bec31c2aac --- /dev/null +++ b/2022/CVE-2022-32548.json @@ -0,0 +1,31 @@ +[ + { + "id": 609523432, + "name": "draytek-RCE", + "full_name": "uicres\/draytek-RCE", + "owner": { + "login": "uicres", + "id": 126958497, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/126958497?v=4", + "html_url": "https:\/\/github.com\/uicres" + }, + "html_url": "https:\/\/github.com\/uicres\/draytek-RCE", + "description": "mass exploiter for draytek vigor (CVE-2022-32548)", + "fork": false, + "created_at": "2023-03-04T12:44:50Z", + "updated_at": "2023-03-04T12:44:50Z", + "pushed_at": "2023-03-04T12:53:01Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39952.json b/2022/CVE-2022-39952.json index 1ce3788559..339a0f94fc 100644 --- a/2022/CVE-2022-39952.json +++ b/2022/CVE-2022-39952.json @@ -18,13 +18,13 @@ "stargazers_count": 231, "watchers_count": 231, "has_discussions": false, - "forks_count": 46, + "forks_count": 45, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 46, + "forks": 45, "watchers": 231, "score": 0 }, diff --git a/2022/CVE-2022-44268.json b/2022/CVE-2022-44268.json index 7f5a6941f2..3324f0a158 100644 --- a/2022/CVE-2022-44268.json +++ b/2022/CVE-2022-44268.json @@ -190,10 +190,10 @@ "description": "A PoC for the CVE-2022-44268 - ImageMagick arbitrary file read", "fork": false, "created_at": "2023-02-05T18:42:27Z", - "updated_at": "2023-03-01T22:25:26Z", + "updated_at": "2023-03-04T16:21:49Z", "pushed_at": "2023-02-05T19:35:03Z", - "stargazers_count": 103, - "watchers_count": 103, + "stargazers_count": 104, + "watchers_count": 104, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -202,7 +202,7 @@ "topics": [], "visibility": "public", "forks": 15, - "watchers": 103, + "watchers": 104, "score": 0 }, { diff --git a/2022/CVE-2022-46689.json b/2022/CVE-2022-46689.json index 83a3b5fa34..bfee391175 100644 --- a/2022/CVE-2022-46689.json +++ b/2022/CVE-2022-46689.json @@ -349,10 +349,10 @@ "description": "CVE-2022-46689", "fork": false, "created_at": "2023-01-26T19:52:30Z", - "updated_at": "2023-03-04T03:13:34Z", + "updated_at": "2023-03-04T16:05:54Z", "pushed_at": "2023-03-01T07:20:02Z", - "stargazers_count": 135, - "watchers_count": 135, + "stargazers_count": 137, + "watchers_count": 137, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -361,7 +361,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 135, + "watchers": 137, "score": 0 }, { diff --git a/2022/CVE-2022-47966.json b/2022/CVE-2022-47966.json index 171aedbf6f..74caa89911 100644 --- a/2022/CVE-2022-47966.json +++ b/2022/CVE-2022-47966.json @@ -57,35 +57,6 @@ "watchers": 0, "score": 0 }, - { - "id": 590961091, - "name": "CVE-2022-47966", - "full_name": "p33d\/CVE-2022-47966", - "owner": { - "login": "p33d", - "id": 123099747, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123099747?v=4", - "html_url": "https:\/\/github.com\/p33d" - }, - "html_url": "https:\/\/github.com\/p33d\/CVE-2022-47966", - "description": "Multiple Zoho ManageEngine on-premise products", - "fork": false, - "created_at": "2023-01-19T16:06:56Z", - "updated_at": "2023-01-23T09:13:57Z", - "pushed_at": "2023-01-19T17:26:07Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - }, { "id": 592261667, "name": "CVE-2022-47966", diff --git a/2023/CVE-2023-21839.json b/2023/CVE-2023-21839.json index 04c9c8c537..f2717cc514 100644 --- a/2023/CVE-2023-21839.json +++ b/2023/CVE-2023-21839.json @@ -13,10 +13,10 @@ "description": "Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)", "fork": false, "created_at": "2023-02-13T03:42:27Z", - "updated_at": "2023-03-03T16:33:34Z", + "updated_at": "2023-03-04T13:54:25Z", "pushed_at": "2023-03-03T03:30:04Z", - "stargazers_count": 421, - "watchers_count": 421, + "stargazers_count": 422, + "watchers_count": 422, "has_discussions": false, "forks_count": 60, "allow_forking": true, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 60, - "watchers": 421, + "watchers": 422, "score": 0 }, { diff --git a/2023/CVE-2023-23488.json b/2023/CVE-2023-23488.json index d889c86527..c52ff409c9 100644 --- a/2023/CVE-2023-23488.json +++ b/2023/CVE-2023-23488.json @@ -13,10 +13,10 @@ "description": "Unauthenticated SQL Injection - Paid Memberships Pro < 2.9.8 (WordPress Plugin)", "fork": false, "created_at": "2023-01-24T18:26:10Z", - "updated_at": "2023-02-25T10:06:59Z", + "updated_at": "2023-03-04T14:46:33Z", "pushed_at": "2023-01-24T18:33:26Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 2, - "watchers": 8, + "watchers": 9, "score": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-24055.json b/2023/CVE-2023-24055.json index 26c83cd3f8..2715adf603 100644 --- a/2023/CVE-2023-24055.json +++ b/2023/CVE-2023-24055.json @@ -47,13 +47,13 @@ "stargazers_count": 232, "watchers_count": 232, "has_discussions": false, - "forks_count": 38, + "forks_count": 37, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 38, + "forks": 37, "watchers": 232, "score": 0 }, diff --git a/2023/CVE-2023-24362.json b/2023/CVE-2023-24362.json new file mode 100644 index 0000000000..35cb20330d --- /dev/null +++ b/2023/CVE-2023-24362.json @@ -0,0 +1,31 @@ +[ + { + "id": 592126630, + "name": "CVE-2023-24362", + "full_name": "cavetownie\/CVE-2023-24362", + "owner": { + "login": "cavetownie", + "id": 43811607, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43811607?v=4", + "html_url": "https:\/\/github.com\/cavetownie" + }, + "html_url": "https:\/\/github.com\/cavetownie\/CVE-2023-24362", + "description": null, + "fork": false, + "created_at": "2023-01-23T01:10:08Z", + "updated_at": "2023-03-04T13:18:48Z", + "pushed_at": "2023-02-18T14:57:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-25136.json b/2023/CVE-2023-25136.json index 2582100992..dba4c3a755 100644 --- a/2023/CVE-2023-25136.json +++ b/2023/CVE-2023-25136.json @@ -71,10 +71,10 @@ "description": "OpenSSH 9.1 vulnerability mass scan and exploit", "fork": false, "created_at": "2023-02-22T19:44:08Z", - "updated_at": "2023-03-03T09:04:19Z", + "updated_at": "2023-03-04T13:17:47Z", "pushed_at": "2023-03-01T08:21:32Z", - "stargazers_count": 64, - "watchers_count": 64, + "stargazers_count": 65, + "watchers_count": 65, "has_discussions": false, "forks_count": 14, "allow_forking": true, @@ -83,7 +83,7 @@ "topics": [], "visibility": "public", "forks": 14, - "watchers": 64, + "watchers": 65, "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index e2688d9511..cc2b22ca40 100644 --- a/README.md +++ b/README.md @@ -207,6 +207,9 @@ Grand Theft Auto V for PC allows attackers to achieve partial remote code execut - [gmh5225/CVE-2023-24059](https://github.com/gmh5225/CVE-2023-24059) +### CVE-2023-24362 +- [cavetownie/CVE-2023-24362](https://github.com/cavetownie/CVE-2023-24362) + ### CVE-2023-24610 (2023-02-01) @@ -4330,6 +4333,14 @@ Apache Shiro before 1.9.1, A RegexRequestMatcher can be misconfigured to be bypa - [Lay0us1/CVE-2022-32532](https://github.com/Lay0us1/CVE-2022-32532) +### CVE-2022-32548 (2022-08-29) + + +An issue was discovered on certain DrayTek Vigor routers before July 2022 such as the Vigor3910 before 4.3.1.1. /cgi-bin/wlogin.cgi has a buffer overflow via the username or password to the aa or ab field. + + +- [uicres/draytek-RCE](https://github.com/uicres/draytek-RCE) + ### CVE-2022-32832 (2022-09-23) @@ -6157,7 +6168,6 @@ Multiple Zoho ManageEngine on-premise products, such as ServiceDesk Plus through - [horizon3ai/CVE-2022-47966](https://github.com/horizon3ai/CVE-2022-47966) - [shameem-testing/PoC-for-ME-SAML-Vulnerability](https://github.com/shameem-testing/PoC-for-ME-SAML-Vulnerability) -- [p33d/CVE-2022-47966](https://github.com/p33d/CVE-2022-47966) - [Inplex-sys/CVE-2022-47966](https://github.com/Inplex-sys/CVE-2022-47966) - [ACE-Responder/CVE-2022-47966_checker](https://github.com/ACE-Responder/CVE-2022-47966_checker) - [vonahisec/CVE-2022-47966-Scan](https://github.com/vonahisec/CVE-2022-47966-Scan) @@ -7028,6 +7038,7 @@ Ignition before 2.5.2, as used in Laravel and other products, allows unauthentic - [hupe1980/CVE-2021-3129](https://github.com/hupe1980/CVE-2021-3129) - [0nion1/CVE-2021-3129](https://github.com/0nion1/CVE-2021-3129) - [MadExploits/Laravel-debug-Checker](https://github.com/MadExploits/Laravel-debug-Checker) +- [ajisai-babu/CVE-2021-3129-exp](https://github.com/ajisai-babu/CVE-2021-3129-exp) ### CVE-2021-3130 (2021-01-20)