diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index 2e8a73cf00..a9bf29d46d 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -386,10 +386,10 @@ "description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ", "fork": false, "created_at": "2020-02-22T16:16:20Z", - "updated_at": "2024-12-07T09:08:40Z", + "updated_at": "2024-12-13T20:29:20Z", "pushed_at": "2020-03-09T14:51:43Z", - "stargazers_count": 367, - "watchers_count": 367, + "stargazers_count": 368, + "watchers_count": 368, "has_discussions": false, "forks_count": 111, "allow_forking": true, @@ -404,7 +404,7 @@ ], "visibility": "public", "forks": 111, - "watchers": 367, + "watchers": 368, "score": 0, "subscribers_count": 5 }, diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json index 16fb55957b..a2cacbebde 100644 --- a/2021/CVE-2021-40444.json +++ b/2021/CVE-2021-40444.json @@ -231,10 +231,10 @@ "description": "CVE-2021-40444 PoC", "fork": false, "created_at": "2021-09-10T16:55:53Z", - "updated_at": "2024-12-10T04:31:07Z", + "updated_at": "2024-12-13T20:49:15Z", "pushed_at": "2021-12-25T18:31:02Z", - "stargazers_count": 1604, - "watchers_count": 1604, + "stargazers_count": 1603, + "watchers_count": 1603, "has_discussions": false, "forks_count": 482, "allow_forking": true, @@ -243,7 +243,7 @@ "topics": [], "visibility": "public", "forks": 482, - "watchers": 1604, + "watchers": 1603, "score": 0, "subscribers_count": 28 }, diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index 0ab2454166..0b9efa0b8f 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -665,10 +665,10 @@ "description": "CVE-2022-0847", "fork": false, "created_at": "2022-03-09T02:47:08Z", - "updated_at": "2024-11-19T16:43:07Z", + "updated_at": "2024-12-13T18:53:00Z", "pushed_at": "2022-03-09T02:47:32Z", - "stargazers_count": 77, - "watchers_count": 77, + "stargazers_count": 76, + "watchers_count": 76, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -679,7 +679,7 @@ ], "visibility": "public", "forks": 16, - "watchers": 77, + "watchers": 76, "score": 0, "subscribers_count": 5 }, diff --git a/2022/CVE-2022-22963.json b/2022/CVE-2022-22963.json index 16c614e009..fed2558777 100644 --- a/2022/CVE-2022-22963.json +++ b/2022/CVE-2022-22963.json @@ -862,5 +862,36 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 903170019, + "name": "CVE-2022-22963", + "full_name": "Shayz614\/CVE-2022-22963", + "owner": { + "login": "Shayz614", + "id": 77766318, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77766318?v=4", + "html_url": "https:\/\/github.com\/Shayz614", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Shayz614\/CVE-2022-22963", + "description": "CVE to CTF FP", + "fork": false, + "created_at": "2024-12-13T22:54:28Z", + "updated_at": "2024-12-13T22:56:47Z", + "pushed_at": "2024-12-13T22:56:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-33679.json b/2022/CVE-2022-33679.json index bd5c8f4506..e9184c0157 100644 --- a/2022/CVE-2022-33679.json +++ b/2022/CVE-2022-33679.json @@ -14,10 +14,10 @@ "description": "One day based on https:\/\/googleprojectzero.blogspot.com\/2022\/10\/rc4-is-still-considered-harmful.html", "fork": false, "created_at": "2022-11-02T18:38:01Z", - "updated_at": "2024-12-09T01:44:53Z", + "updated_at": "2024-12-13T21:06:58Z", "pushed_at": "2024-11-10T17:21:28Z", - "stargazers_count": 395, - "watchers_count": 395, + "stargazers_count": 396, + "watchers_count": 396, "has_discussions": false, "forks_count": 69, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 69, - "watchers": 395, + "watchers": 396, "score": 0, "subscribers_count": 8 }, diff --git a/2022/CVE-2022-38694.json b/2022/CVE-2022-38694.json index d557b87b5d..ff7bf90b49 100644 --- a/2022/CVE-2022-38694.json +++ b/2022/CVE-2022-38694.json @@ -19,7 +19,7 @@ "stargazers_count": 307, "watchers_count": 307, "has_discussions": true, - "forks_count": 44, + "forks_count": 45, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -28,7 +28,7 @@ "unisoc" ], "visibility": "public", - "forks": 44, + "forks": 45, "watchers": 307, "score": 0, "subscribers_count": 8 diff --git a/2023/CVE-2023-25690.json b/2023/CVE-2023-25690.json index 270ad98860..a61247e9f6 100644 --- a/2023/CVE-2023-25690.json +++ b/2023/CVE-2023-25690.json @@ -49,10 +49,10 @@ "description": "CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability.", "fork": false, "created_at": "2023-05-22T03:06:31Z", - "updated_at": "2024-12-10T03:54:16Z", + "updated_at": "2024-12-13T21:40:02Z", "pushed_at": "2024-08-24T13:38:50Z", - "stargazers_count": 271, - "watchers_count": 271, + "stargazers_count": 272, + "watchers_count": 272, "has_discussions": false, "forks_count": 36, "allow_forking": true, @@ -69,7 +69,7 @@ ], "visibility": "public", "forks": 36, - "watchers": 271, + "watchers": 272, "score": 0, "subscribers_count": 4 }, diff --git a/2024/CVE-2024-34351.json b/2024/CVE-2024-34351.json index 308d4bd2f4..8260ff0904 100644 --- a/2024/CVE-2024-34351.json +++ b/2024/CVE-2024-34351.json @@ -76,10 +76,10 @@ "description": "PoC for a full exploitation of NextJS SSRF (CVE-2024-34351)", "fork": false, "created_at": "2024-08-27T15:10:26Z", - "updated_at": "2024-10-04T18:20:48Z", + "updated_at": "2024-12-13T19:24:09Z", "pushed_at": "2024-08-27T15:21:07Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-44083.json b/2024/CVE-2024-44083.json index 7c2ce7e044..029624d6c1 100644 --- a/2024/CVE-2024-44083.json +++ b/2024/CVE-2024-44083.json @@ -14,10 +14,10 @@ "description": "Makes IDA (most versions) to crash upon opening it. ", "fork": false, "created_at": "2024-08-25T12:33:14Z", - "updated_at": "2024-12-05T11:44:31Z", + "updated_at": "2024-12-13T18:32:33Z", "pushed_at": "2024-08-30T09:58:12Z", - "stargazers_count": 70, - "watchers_count": 70, + "stargazers_count": 71, + "watchers_count": 71, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 70, + "watchers": 71, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-4577.json b/2024/CVE-2024-4577.json index 1cef7bd3c0..246af96965 100644 --- a/2024/CVE-2024-4577.json +++ b/2024/CVE-2024-4577.json @@ -548,10 +548,10 @@ "description": "[漏洞复现] 全球首款利用PHP默认环境(XAMPP)的CVE-2024-4577 PHP-CGI RCE 漏洞 EXP。", "fork": false, "created_at": "2024-06-08T13:04:45Z", - "updated_at": "2024-12-10T05:57:56Z", + "updated_at": "2024-12-13T21:54:39Z", "pushed_at": "2024-07-21T20:27:03Z", - "stargazers_count": 124, - "watchers_count": 124, + "stargazers_count": 125, + "watchers_count": 125, "has_discussions": false, "forks_count": 31, "allow_forking": true, @@ -560,7 +560,7 @@ "topics": [], "visibility": "public", "forks": 31, - "watchers": 124, + "watchers": 125, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-4956.json b/2024/CVE-2024-4956.json index 0596aa6d55..4265703ec0 100644 --- a/2024/CVE-2024-4956.json +++ b/2024/CVE-2024-4956.json @@ -538,10 +538,10 @@ "description": "CVE-2024-4956 Python exploitation utility", "fork": false, "created_at": "2024-12-12T04:05:10Z", - "updated_at": "2024-12-13T16:50:36Z", + "updated_at": "2024-12-13T22:26:06Z", "pushed_at": "2024-12-12T04:07:35Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -550,7 +550,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-51179.json b/2024/CVE-2024-51179.json index 8828e9b500..a44c0ca66d 100644 --- a/2024/CVE-2024-51179.json +++ b/2024/CVE-2024-51179.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2024-11-08T11:47:07Z", - "updated_at": "2024-11-28T12:07:11Z", + "updated_at": "2024-12-13T20:55:01Z", "pushed_at": "2024-11-08T18:42:51Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-53677.json b/2024/CVE-2024-53677.json index 35a5fc5d16..38feccdd93 100644 --- a/2024/CVE-2024-53677.json +++ b/2024/CVE-2024-53677.json @@ -45,8 +45,8 @@ "description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.", "fork": false, "created_at": "2024-12-13T17:42:55Z", - "updated_at": "2024-12-13T18:31:21Z", - "pushed_at": "2024-12-13T18:31:16Z", + "updated_at": "2024-12-13T18:31:45Z", + "pushed_at": "2024-12-13T18:31:41Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2024/CVE-2024-8856.json b/2024/CVE-2024-8856.json index 6200bb6d62..6a6eff1090 100644 --- a/2024/CVE-2024-8856.json +++ b/2024/CVE-2024-8856.json @@ -45,10 +45,10 @@ "description": "This tool scans WordPress websites for vulnerabilities in the WP Time Capsule plugin related to CVE-2024-8856. It identifies plugin versions below 1.22.22 as vulnerable and logs results to vuln.txt. Simple and efficient, it helps security researchers and admins detect and address risks quickly.", "fork": false, "created_at": "2024-11-21T04:01:27Z", - "updated_at": "2024-12-07T21:27:47Z", + "updated_at": "2024-12-14T00:19:07Z", "pushed_at": "2024-11-21T04:41:25Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -67,7 +67,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/README.md b/README.md index 01b3f691c2..522be896ad 100644 --- a/README.md +++ b/README.md @@ -17788,6 +17788,7 @@ - [nikn0laty/RCE-in-Spring-Cloud-CVE-2022-22963](https://github.com/nikn0laty/RCE-in-Spring-Cloud-CVE-2022-22963) - [BearClaw96/CVE-2022-22963-Poc-Bearcules](https://github.com/BearClaw96/CVE-2022-22963-Poc-Bearcules) - [jrbH4CK/CVE-2022-22963](https://github.com/jrbH4CK/CVE-2022-22963) +- [Shayz614/CVE-2022-22963](https://github.com/Shayz614/CVE-2022-22963) ### CVE-2022-22965 (2022-04-01)