diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 5238b5038f..2722d985bb 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -43,10 +43,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-03-16T11:08:04Z", + "updated_at": "2024-03-24T09:06:37Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1896, - "watchers_count": 1896, + "stargazers_count": 1897, + "watchers_count": 1897, "has_discussions": true, "forks_count": 331, "allow_forking": true, @@ -76,7 +76,7 @@ ], "visibility": "public", "forks": 331, - "watchers": 1896, + "watchers": 1897, "score": 0, "subscribers_count": 35 }, diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 6318ba25f2..839ec2fad4 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-03-16T11:08:04Z", + "updated_at": "2024-03-24T09:06:37Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1896, - "watchers_count": 1896, + "stargazers_count": 1897, + "watchers_count": 1897, "has_discussions": true, "forks_count": 331, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 331, - "watchers": 1896, + "watchers": 1897, "score": 0, "subscribers_count": 35 }, diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index b689ceb4fe..2154fbe9b5 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -43,10 +43,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-03-16T11:08:04Z", + "updated_at": "2024-03-24T09:06:37Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1896, - "watchers_count": 1896, + "stargazers_count": 1897, + "watchers_count": 1897, "has_discussions": true, "forks_count": 331, "allow_forking": true, @@ -76,7 +76,7 @@ ], "visibility": "public", "forks": 331, - "watchers": 1896, + "watchers": 1897, "score": 0, "subscribers_count": 35 }, diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index c45cbf280c..0473e24ecb 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -557,10 +557,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-03-16T11:08:04Z", + "updated_at": "2024-03-24T09:06:37Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1896, - "watchers_count": 1896, + "stargazers_count": 1897, + "watchers_count": 1897, "has_discussions": true, "forks_count": 331, "allow_forking": true, @@ -590,7 +590,7 @@ ], "visibility": "public", "forks": 331, - "watchers": 1896, + "watchers": 1897, "score": 0, "subscribers_count": 35 }, diff --git a/2019/CVE-2019-16253.json b/2019/CVE-2019-16253.json index 7104db903e..b8301abd62 100644 --- a/2019/CVE-2019-16253.json +++ b/2019/CVE-2019-16253.json @@ -13,10 +13,10 @@ "description": "Exploit I discovered in October of 2022 with androids Package manager binary (pm) and the way it handled debugging flags, patched out by march 2023. Uses CVE-2019-16253 as a payload to obtain a system shell. ", "fork": false, "created_at": "2023-01-19T19:47:13Z", - "updated_at": "2024-03-23T13:26:57Z", + "updated_at": "2024-03-24T08:10:00Z", "pushed_at": "2024-03-20T19:12:39Z", - "stargazers_count": 63, - "watchers_count": 63, + "stargazers_count": 64, + "watchers_count": 64, "has_discussions": false, "forks_count": 10, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 10, - "watchers": 63, + "watchers": 64, "score": 0, "subscribers_count": 10 } diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 2b77d25d9f..816f0923a6 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -193,10 +193,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-03-16T11:08:04Z", + "updated_at": "2024-03-24T09:06:37Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1896, - "watchers_count": 1896, + "stargazers_count": 1897, + "watchers_count": 1897, "has_discussions": true, "forks_count": 331, "allow_forking": true, @@ -226,7 +226,7 @@ ], "visibility": "public", "forks": 331, - "watchers": 1896, + "watchers": 1897, "score": 0, "subscribers_count": 35 } diff --git a/2019/CVE-2019-5736.json b/2019/CVE-2019-5736.json index c54ab1c4aa..89e19479d0 100644 --- a/2019/CVE-2019-5736.json +++ b/2019/CVE-2019-5736.json @@ -13,10 +13,10 @@ "description": "Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape)", "fork": false, "created_at": "2019-02-12T22:07:47Z", - "updated_at": "2024-03-14T10:40:36Z", + "updated_at": "2024-03-24T09:42:22Z", "pushed_at": "2019-02-20T15:35:34Z", - "stargazers_count": 206, - "watchers_count": 206, + "stargazers_count": 207, + "watchers_count": 207, "has_discussions": false, "forks_count": 69, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 69, - "watchers": 206, + "watchers": 207, "score": 0, "subscribers_count": 12 }, diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 675d574378..092d008012 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-03-16T11:08:04Z", + "updated_at": "2024-03-24T09:06:37Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1896, - "watchers_count": 1896, + "stargazers_count": 1897, + "watchers_count": 1897, "has_discussions": true, "forks_count": 331, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 331, - "watchers": 1896, + "watchers": 1897, "score": 0, "subscribers_count": 35 }, diff --git a/2021/CVE-2021-26084.json b/2021/CVE-2021-26084.json index 956f963e2e..6ebd918a11 100644 --- a/2021/CVE-2021-26084.json +++ b/2021/CVE-2021-26084.json @@ -133,10 +133,10 @@ "description": "Confluence Server Webwork OGNL injection", "fork": false, "created_at": "2021-09-01T07:15:17Z", - "updated_at": "2024-03-14T10:40:52Z", + "updated_at": "2024-03-24T11:20:48Z", "pushed_at": "2021-12-03T22:09:31Z", - "stargazers_count": 301, - "watchers_count": 301, + "stargazers_count": 302, + "watchers_count": 302, "has_discussions": false, "forks_count": 83, "allow_forking": true, @@ -145,7 +145,7 @@ "topics": [], "visibility": "public", "forks": 83, - "watchers": 301, + "watchers": 302, "score": 0, "subscribers_count": 2 }, diff --git a/2021/CVE-2021-30807.json b/2021/CVE-2021-30807.json index 21246bd62d..2e1e33ac39 100644 --- a/2021/CVE-2021-30807.json +++ b/2021/CVE-2021-30807.json @@ -13,10 +13,10 @@ "description": "Exploit for CVE-2021-30807", "fork": false, "created_at": "2021-10-09T20:11:42Z", - "updated_at": "2024-03-23T02:12:52Z", + "updated_at": "2024-03-24T11:23:16Z", "pushed_at": "2021-11-29T13:50:42Z", - "stargazers_count": 130, - "watchers_count": 130, + "stargazers_count": 131, + "watchers_count": 131, "has_discussions": false, "forks_count": 31, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 31, - "watchers": 130, + "watchers": 131, "score": 0, "subscribers_count": 5 }, diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index 3cc64e5838..723ce631f9 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -470,10 +470,10 @@ "description": null, "fork": false, "created_at": "2021-01-30T20:39:58Z", - "updated_at": "2024-03-22T16:11:16Z", + "updated_at": "2024-03-24T09:25:36Z", "pushed_at": "2021-02-02T17:07:09Z", - "stargazers_count": 913, - "watchers_count": 913, + "stargazers_count": 914, + "watchers_count": 914, "has_discussions": false, "forks_count": 235, "allow_forking": true, @@ -482,7 +482,7 @@ "topics": [], "visibility": "public", "forks": 235, - "watchers": 913, + "watchers": 914, "score": 0, "subscribers_count": 27 }, @@ -1074,10 +1074,10 @@ "description": "Sudo Baron Samedit Exploit", "fork": false, "created_at": "2021-03-15T17:37:02Z", - "updated_at": "2024-03-12T10:57:18Z", + "updated_at": "2024-03-24T09:17:44Z", "pushed_at": "2022-01-13T05:48:01Z", - "stargazers_count": 703, - "watchers_count": 703, + "stargazers_count": 704, + "watchers_count": 704, "has_discussions": false, "forks_count": 165, "allow_forking": true, @@ -1086,7 +1086,7 @@ "topics": [], "visibility": "public", "forks": 165, - "watchers": 703, + "watchers": 704, "score": 0, "subscribers_count": 11 }, diff --git a/2021/CVE-2021-3560.json b/2021/CVE-2021-3560.json index 8ac3d5beee..7b52d93241 100644 --- a/2021/CVE-2021-3560.json +++ b/2021/CVE-2021-3560.json @@ -750,5 +750,35 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 776748749, + "name": "CVE-2021-3560-EXPLOIT", + "full_name": "Kyyomaa\/CVE-2021-3560-EXPLOIT", + "owner": { + "login": "Kyyomaa", + "id": 123502260, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123502260?v=4", + "html_url": "https:\/\/github.com\/Kyyomaa" + }, + "html_url": "https:\/\/github.com\/Kyyomaa\/CVE-2021-3560-EXPLOIT", + "description": "Part of my cybersecurity thesis consists in exploring and exploiting this vulnerability.", + "fork": false, + "created_at": "2024-03-24T11:37:18Z", + "updated_at": "2024-03-24T11:39:41Z", + "pushed_at": "2024-03-24T12:05:05Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 6634e4bd65..1a29ed806d 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -907,10 +907,10 @@ "description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ", "fork": false, "created_at": "2021-12-10T23:19:28Z", - "updated_at": "2024-03-23T22:49:13Z", + "updated_at": "2024-03-24T07:07:43Z", "pushed_at": "2024-02-12T22:37:25Z", - "stargazers_count": 1729, - "watchers_count": 1729, + "stargazers_count": 1730, + "watchers_count": 1730, "has_discussions": false, "forks_count": 516, "allow_forking": true, @@ -924,7 +924,7 @@ ], "visibility": "public", "forks": 516, - "watchers": 1729, + "watchers": 1730, "score": 0, "subscribers_count": 28 }, diff --git a/2022/CVE-2022-0492.json b/2022/CVE-2022-0492.json index 9066e66f74..eb5eadd371 100644 --- a/2022/CVE-2022-0492.json +++ b/2022/CVE-2022-0492.json @@ -193,10 +193,10 @@ "description": "Docker Breakout Checker and PoC via CAP_SYS_ADMIN and via user namespaces (CVE-2022-0492)", "fork": false, "created_at": "2023-02-18T04:48:25Z", - "updated_at": "2023-05-30T00:56:36Z", + "updated_at": "2024-03-24T09:39:48Z", "pushed_at": "2023-02-18T05:28:02Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -212,7 +212,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2022/CVE-2022-21660.json b/2022/CVE-2022-21660.json index dbcae7310d..e8e249bea6 100644 --- a/2022/CVE-2022-21660.json +++ b/2022/CVE-2022-21660.json @@ -13,10 +13,10 @@ "description": "CVE-2022-21660", "fork": false, "created_at": "2022-01-10T05:50:35Z", - "updated_at": "2024-01-26T09:40:56Z", + "updated_at": "2024-03-24T07:37:20Z", "pushed_at": "2022-01-10T05:52:03Z", - "stargazers_count": 24, - "watchers_count": 24, + "stargazers_count": 25, + "watchers_count": 25, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 24, + "watchers": 25, "score": 0, "subscribers_count": 1 }, diff --git a/2022/CVE-2022-21661.json b/2022/CVE-2022-21661.json index 0e387a1a3f..411fc31ce5 100644 --- a/2022/CVE-2022-21661.json +++ b/2022/CVE-2022-21661.json @@ -309,5 +309,35 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 776679745, + "name": "WordPress--CVE-2022-21661", + "full_name": "CharonDefalt\/WordPress--CVE-2022-21661", + "owner": { + "login": "CharonDefalt", + "id": 103410775, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103410775?v=4", + "html_url": "https:\/\/github.com\/CharonDefalt" + }, + "html_url": "https:\/\/github.com\/CharonDefalt\/WordPress--CVE-2022-21661", + "description": null, + "fork": false, + "created_at": "2024-03-24T07:03:35Z", + "updated_at": "2024-03-24T07:03:35Z", + "pushed_at": "2024-03-24T07:03:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-22978.json b/2022/CVE-2022-22978.json index 4f548acd0c..73f5c7cf1a 100644 --- a/2022/CVE-2022-22978.json +++ b/2022/CVE-2022-22978.json @@ -153,5 +153,35 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 776718207, + "name": "spring-security-CVE-2022-22978", + "full_name": "mukeshkumar286\/spring-security-CVE-2022-22978", + "owner": { + "login": "mukeshkumar286", + "id": 17064062, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17064062?v=4", + "html_url": "https:\/\/github.com\/mukeshkumar286" + }, + "html_url": "https:\/\/github.com\/mukeshkumar286\/spring-security-CVE-2022-22978", + "description": null, + "fork": false, + "created_at": "2024-03-24T09:42:40Z", + "updated_at": "2024-03-24T09:42:40Z", + "pushed_at": "2024-03-24T10:28:03Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-32898.json b/2022/CVE-2022-32898.json new file mode 100644 index 0000000000..59f3e5f859 --- /dev/null +++ b/2022/CVE-2022-32898.json @@ -0,0 +1,32 @@ +[ + { + "id": 776714071, + "name": "CVE-2022-32898", + "full_name": "ox1111\/CVE-2022-32898", + "owner": { + "login": "ox1111", + "id": 31942498, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31942498?v=4", + "html_url": "https:\/\/github.com\/ox1111" + }, + "html_url": "https:\/\/github.com\/ox1111\/CVE-2022-32898", + "description": null, + "fork": false, + "created_at": "2024-03-24T09:26:29Z", + "updated_at": "2024-03-24T09:26:29Z", + "pushed_at": "2024-03-24T10:41:01Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-46689.json b/2022/CVE-2022-46689.json index 94dee7498d..5e4b828248 100644 --- a/2022/CVE-2022-46689.json +++ b/2022/CVE-2022-46689.json @@ -360,7 +360,7 @@ "stargazers_count": 8, "watchers_count": 8, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -373,7 +373,7 @@ "macos" ], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 8, "score": 0, "subscribers_count": 2 diff --git a/2022/CVE-2022-46718.json b/2022/CVE-2022-46718.json index a8147091ca..eeab12676c 100644 --- a/2022/CVE-2022-46718.json +++ b/2022/CVE-2022-46718.json @@ -13,10 +13,10 @@ "description": "CVE-2022-46718: an app may be able to read sensitive location information.", "fork": false, "created_at": "2023-05-01T18:34:52Z", - "updated_at": "2024-03-24T01:36:11Z", + "updated_at": "2024-03-24T09:17:07Z", "pushed_at": "2023-05-01T18:48:34Z", - "stargazers_count": 14, - "watchers_count": 14, + "stargazers_count": 15, + "watchers_count": 15, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 14, + "watchers": 15, "score": 0, "subscribers_count": 2 } diff --git a/2023/CVE-2023-2640.json b/2023/CVE-2023-2640.json index cd01a66947..2e4f5ec629 100644 --- a/2023/CVE-2023-2640.json +++ b/2023/CVE-2023-2640.json @@ -43,19 +43,19 @@ "description": "GameoverlayFS (CVE-2023-2640 and CVE-2023-32629) exploit in Shell Script tested on Ubuntu 20.04 Kernel 5.4.0", "fork": false, "created_at": "2023-09-17T23:17:22Z", - "updated_at": "2024-01-28T17:45:12Z", + "updated_at": "2024-03-24T07:52:03Z", "pushed_at": "2023-09-17T23:38:32Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "has_discussions": false, - "forks_count": 3, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 3, - "watchers": 9, + "forks": 4, + "watchers": 10, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-27997.json b/2023/CVE-2023-27997.json index 26340537ac..b688a9ee19 100644 --- a/2023/CVE-2023-27997.json +++ b/2023/CVE-2023-27997.json @@ -193,10 +193,10 @@ "description": "xortigate-cve-2023-27997", "fork": false, "created_at": "2023-10-12T16:12:41Z", - "updated_at": "2024-03-18T13:17:04Z", + "updated_at": "2024-03-24T10:14:48Z", "pushed_at": "2023-10-12T16:17:23Z", - "stargazers_count": 55, - "watchers_count": 55, + "stargazers_count": 56, + "watchers_count": 56, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -205,7 +205,7 @@ "topics": [], "visibility": "public", "forks": 11, - "watchers": 55, + "watchers": 56, "score": 0, "subscribers_count": 4 }, diff --git a/2023/CVE-2023-2982.json b/2023/CVE-2023-2982.json index 036b2fc617..b964e97b18 100644 --- a/2023/CVE-2023-2982.json +++ b/2023/CVE-2023-2982.json @@ -13,10 +13,10 @@ "description": "WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) <= 7.6.4 - Authentication Bypass", "fork": false, "created_at": "2023-06-29T14:21:08Z", - "updated_at": "2024-01-13T12:40:11Z", + "updated_at": "2024-03-24T10:22:10Z", "pushed_at": "2023-07-06T08:14:17Z", - "stargazers_count": 78, - "watchers_count": 78, + "stargazers_count": 79, + "watchers_count": 79, "has_discussions": false, "forks_count": 19, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 19, - "watchers": 78, + "watchers": 79, "score": 0, "subscribers_count": 4 }, diff --git a/2023/CVE-2023-36424.json b/2023/CVE-2023-36424.json index 4dc2e2f763..5f38fbf3cd 100644 --- a/2023/CVE-2023-36424.json +++ b/2023/CVE-2023-36424.json @@ -13,10 +13,10 @@ "description": "Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation", "fork": false, "created_at": "2024-03-21T21:39:24Z", - "updated_at": "2024-03-24T04:25:00Z", + "updated_at": "2024-03-24T11:48:55Z", "pushed_at": "2024-03-22T06:45:43Z", - "stargazers_count": 58, - "watchers_count": 58, + "stargazers_count": 60, + "watchers_count": 60, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 16, - "watchers": 58, + "watchers": 60, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-38646.json b/2023/CVE-2023-38646.json index eacc833b0c..c27d521a7a 100644 --- a/2023/CVE-2023-38646.json +++ b/2023/CVE-2023-38646.json @@ -743,10 +743,10 @@ "description": "Exploit script for Pre-Auth RCE in Metabase (CVE-2023-38646)", "fork": false, "created_at": "2023-10-15T01:29:37Z", - "updated_at": "2024-01-03T23:07:05Z", + "updated_at": "2024-03-24T09:15:02Z", "pushed_at": "2023-10-15T01:51:31Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -755,7 +755,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 5, + "watchers": 6, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-41724.json b/2023/CVE-2023-41724.json new file mode 100644 index 0000000000..9f3d516eed --- /dev/null +++ b/2023/CVE-2023-41724.json @@ -0,0 +1,32 @@ +[ + { + "id": 776684778, + "name": "CVE-2023-41724", + "full_name": "russhackerr\/CVE-2023-41724", + "owner": { + "login": "russhackerr", + "id": 164726028, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164726028?v=4", + "html_url": "https:\/\/github.com\/russhackerr" + }, + "html_url": "https:\/\/github.com\/russhackerr\/CVE-2023-41724", + "description": "CVE-2023-41724 POC RCE Ivanti", + "fork": false, + "created_at": "2024-03-24T07:25:46Z", + "updated_at": "2024-03-24T08:37:45Z", + "pushed_at": "2024-03-24T08:23:15Z", + "stargazers_count": 4, + "watchers_count": 4, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 4, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-48788.json b/2023/CVE-2023-48788.json index 06a11d1b58..d01f399e19 100644 --- a/2023/CVE-2023-48788.json +++ b/2023/CVE-2023-48788.json @@ -13,10 +13,10 @@ "description": "Fortinet FortiClient EMS SQL Injection", "fork": false, "created_at": "2024-03-18T20:50:48Z", - "updated_at": "2024-03-24T00:48:18Z", + "updated_at": "2024-03-24T10:10:36Z", "pushed_at": "2024-03-20T20:42:41Z", - "stargazers_count": 16, - "watchers_count": 16, + "stargazers_count": 18, + "watchers_count": 18, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 16, + "watchers": 18, "score": 0, "subscribers_count": 4 } diff --git a/2023/CVE-2023-50387.json b/2023/CVE-2023-50387.json index aacdff808f..0973119e6a 100644 --- a/2023/CVE-2023-50387.json +++ b/2023/CVE-2023-50387.json @@ -13,10 +13,10 @@ "description": "KeyTrap (DNSSEC)", "fork": false, "created_at": "2024-02-18T21:50:04Z", - "updated_at": "2024-03-19T22:48:35Z", + "updated_at": "2024-03-24T10:24:32Z", "pushed_at": "2024-02-18T22:15:14Z", - "stargazers_count": 37, - "watchers_count": 37, + "stargazers_count": 38, + "watchers_count": 38, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 37, + "watchers": 38, "score": 0, "subscribers_count": 2 } diff --git a/2023/CVE-2023-51467.json b/2023/CVE-2023-51467.json index 26e18213dd..c5fd51728e 100644 --- a/2023/CVE-2023-51467.json +++ b/2023/CVE-2023-51467.json @@ -125,7 +125,7 @@ "fork": false, "created_at": "2024-01-02T14:20:10Z", "updated_at": "2024-03-21T14:04:33Z", - "pushed_at": "2024-03-05T14:06:45Z", + "pushed_at": "2024-03-24T06:38:33Z", "stargazers_count": 56, "watchers_count": 56, "has_discussions": false, diff --git a/2024/CVE-2024-1071.json b/2024/CVE-2024-1071.json index fe87969c6b..ad2b294cc0 100644 --- a/2024/CVE-2024-1071.json +++ b/2024/CVE-2024-1071.json @@ -13,10 +13,10 @@ "description": "Ultimate Member Unauthorized Database Access \/ SQLi", "fork": false, "created_at": "2024-02-27T11:41:53Z", - "updated_at": "2024-03-13T21:52:04Z", + "updated_at": "2024-03-24T10:08:34Z", "pushed_at": "2024-02-27T11:45:50Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 5, + "watchers": 6, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-1212.json b/2024/CVE-2024-1212.json index 1be7b53776..5426770687 100644 --- a/2024/CVE-2024-1212.json +++ b/2024/CVE-2024-1212.json @@ -13,10 +13,10 @@ "description": "Unauthenticated Command Injection In Progress Kemp LoadMaster", "fork": false, "created_at": "2024-03-19T22:23:18Z", - "updated_at": "2024-03-23T17:56:13Z", + "updated_at": "2024-03-24T08:01:02Z", "pushed_at": "2024-03-19T22:25:21Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 7, + "watchers": 8, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-20931.json b/2024/CVE-2024-20931.json index 1e3fad460d..7948f2664f 100644 --- a/2024/CVE-2024-20931.json +++ b/2024/CVE-2024-20931.json @@ -18,13 +18,13 @@ "stargazers_count": 68, "watchers_count": 68, "has_discussions": false, - "forks_count": 9, + "forks_count": 10, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 9, + "forks": 10, "watchers": 68, "score": 0, "subscribers_count": 2 diff --git a/2024/CVE-2024-2169.json b/2024/CVE-2024-2169.json new file mode 100644 index 0000000000..7c2c043759 --- /dev/null +++ b/2024/CVE-2024-2169.json @@ -0,0 +1,32 @@ +[ + { + "id": 776691365, + "name": "G3-Loop-DoS", + "full_name": "douglasbuzatto\/G3-Loop-DoS", + "owner": { + "login": "douglasbuzatto", + "id": 10249957, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10249957?v=4", + "html_url": "https:\/\/github.com\/douglasbuzatto" + }, + "html_url": "https:\/\/github.com\/douglasbuzatto\/G3-Loop-DoS", + "description": "This Python script automates the process of scanning for systems potentially vulnerable to the Loop DoS attack and the hypothetical CVE-2024-2169 vulnerability. It focuses on scanning ports associated with protocols susceptible to denial-of-service (DoS) attacks. The script can be used for educational purposes or authorized penetration testing.", + "fork": false, + "created_at": "2024-03-24T07:53:52Z", + "updated_at": "2024-03-24T07:56:54Z", + "pushed_at": "2024-03-24T08:00:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-21762.json b/2024/CVE-2024-21762.json index 23f87617fb..b7c2421fd4 100644 --- a/2024/CVE-2024-21762.json +++ b/2024/CVE-2024-21762.json @@ -163,10 +163,10 @@ "description": "The PoC demonstrates the potential for remote code execution by exploiting the identified security flaw.", "fork": false, "created_at": "2024-03-17T09:15:22Z", - "updated_at": "2024-03-19T21:43:36Z", + "updated_at": "2024-03-24T09:36:06Z", "pushed_at": "2024-03-17T09:20:35Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -175,7 +175,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-25153.json b/2024/CVE-2024-25153.json index 47b11164bd..cc9b8a6b09 100644 --- a/2024/CVE-2024-25153.json +++ b/2024/CVE-2024-25153.json @@ -13,10 +13,10 @@ "description": "Proof-of-concept exploit for CVE-2024-25153.", "fork": false, "created_at": "2024-03-12T17:26:10Z", - "updated_at": "2024-03-23T01:14:43Z", + "updated_at": "2024-03-24T10:03:04Z", "pushed_at": "2024-03-13T09:46:07Z", - "stargazers_count": 34, - "watchers_count": 34, + "stargazers_count": 35, + "watchers_count": 35, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 11, - "watchers": 34, + "watchers": 35, "score": 0, "subscribers_count": 5 }, diff --git a/README.md b/README.md index 62534799a3..5b821816ca 100644 --- a/README.md +++ b/README.md @@ -158,6 +158,9 @@ - [yuziiiiiiiiii/CVE-2024-2074](https://github.com/yuziiiiiiiiii/CVE-2024-2074) +### CVE-2024-2169 +- [douglasbuzatto/G3-Loop-DoS](https://github.com/douglasbuzatto/G3-Loop-DoS) + ### CVE-2024-2432 - [Hagrid29/CVE-2024-2432-PaloAlto-GlobalProtect-EoP](https://github.com/Hagrid29/CVE-2024-2432-PaloAlto-GlobalProtect-EoP) @@ -6347,6 +6350,9 @@ - [federella/CVE-2023-41717](https://github.com/federella/CVE-2023-41717) +### CVE-2023-41724 +- [russhackerr/CVE-2023-41724](https://github.com/russhackerr/CVE-2023-41724) + ### CVE-2023-41772 (2023-10-10) Win32k Elevation of Privilege Vulnerability @@ -9590,6 +9596,7 @@ - [daniel616/CVE-2022-21661-Demo](https://github.com/daniel616/CVE-2022-21661-Demo) - [sealldeveloper/CVE-2022-21661-PoC](https://github.com/sealldeveloper/CVE-2022-21661-PoC) - [p4ncontomat3/CVE-2022-21661](https://github.com/p4ncontomat3/CVE-2022-21661) +- [CharonDefalt/WordPress--CVE-2022-21661](https://github.com/CharonDefalt/WordPress--CVE-2022-21661) ### CVE-2022-21668 (2022-01-10) @@ -10168,6 +10175,7 @@ - [aeifkz/CVE-2022-22978](https://github.com/aeifkz/CVE-2022-22978) - [umakant76705/CVE-2022-22978](https://github.com/umakant76705/CVE-2022-22978) - [Raghvendra1207/CVE-2022-22978](https://github.com/Raghvendra1207/CVE-2022-22978) +- [mukeshkumar286/spring-security-CVE-2022-22978](https://github.com/mukeshkumar286/spring-security-CVE-2022-22978) ### CVE-2022-22980 (2022-06-22) @@ -12500,6 +12508,13 @@ - [breakpointHQ/CVE-2022-32883](https://github.com/breakpointHQ/CVE-2022-32883) +### CVE-2022-32898 (2022-11-01) + +The issue was addressed with improved memory handling. This issue is fixed in iOS 15.7 and iPadOS 15.7, iOS 16, macOS Ventura 13, watchOS 9. An app may be able to execute arbitrary code with kernel privileges. + + +- [ox1111/CVE-2022-32898](https://github.com/ox1111/CVE-2022-32898) + ### CVE-2022-32947 (2022-11-01) The issue was addressed with improved memory handling. This issue is fixed in iOS 16.1 and iPadOS 16, macOS Ventura 13, watchOS 9.1. An app may be able to execute arbitrary code with kernel privileges. @@ -15748,6 +15763,7 @@ - [TieuLong21Prosper/CVE-2021-3560](https://github.com/TieuLong21Prosper/CVE-2021-3560) - [LucasPDiniz/CVE-2021-3560](https://github.com/LucasPDiniz/CVE-2021-3560) - [markyu0401/CVE-2021-3560-Polkit-Privilege-Escalation](https://github.com/markyu0401/CVE-2021-3560-Polkit-Privilege-Escalation) +- [Kyyomaa/CVE-2021-3560-EXPLOIT](https://github.com/Kyyomaa/CVE-2021-3560-EXPLOIT) ### CVE-2021-3572 (2021-11-10)