diff --git a/1999/CVE-1999-0532.json b/1999/CVE-1999-0532.json index ce6a1379cd..6134fb2882 100644 --- a/1999/CVE-1999-0532.json +++ b/1999/CVE-1999-0532.json @@ -28,35 +28,5 @@ "watchers": 4, "score": 0, "subscribers_count": 2 - }, - { - "id": 338099634, - "name": "dns-zone-transfer-test", - "full_name": "Rodney-O-C-Melby\/dns-zone-transfer-test", - "owner": { - "login": "Rodney-O-C-Melby", - "id": 16503898, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16503898?v=4", - "html_url": "https:\/\/github.com\/Rodney-O-C-Melby" - }, - "html_url": "https:\/\/github.com\/Rodney-O-C-Melby\/dns-zone-transfer-test", - "description": "Automates Domain Name System (DNS) zone transfer testing. Checks for CVE-1999-0532 by automatically finding a given domains nameservers, and tests for zone transfers, if successful, subdomains are printed to standard output.", - "fork": false, - "created_at": "2021-02-11T17:25:24Z", - "updated_at": "2023-03-27T20:49:20Z", - "pushed_at": "2022-05-02T13:11:16Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": true, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0, - "subscribers_count": 3 } ] \ No newline at end of file diff --git a/2016/CVE-2016-5195.json b/2016/CVE-2016-5195.json index 1b03502ded..f812365d06 100644 --- a/2016/CVE-2016-5195.json +++ b/2016/CVE-2016-5195.json @@ -452,7 +452,7 @@ "stargazers_count": 774, "watchers_count": 774, "has_discussions": false, - "forks_count": 435, + "forks_count": 434, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -462,7 +462,7 @@ "exploit" ], "visibility": "public", - "forks": 435, + "forks": 434, "watchers": 774, "score": 0, "subscribers_count": 11 diff --git a/2017/CVE-2017-12615.json b/2017/CVE-2017-12615.json index 99ec5c9745..9e1ddf1545 100644 --- a/2017/CVE-2017-12615.json +++ b/2017/CVE-2017-12615.json @@ -343,10 +343,10 @@ "description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含", "fork": false, "created_at": "2022-11-13T11:01:41Z", - "updated_at": "2023-11-10T15:24:06Z", + "updated_at": "2023-11-13T06:19:37Z", "pushed_at": "2022-11-15T09:05:50Z", - "stargazers_count": 97, - "watchers_count": 97, + "stargazers_count": 98, + "watchers_count": 98, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -355,7 +355,7 @@ "topics": [], "visibility": "public", "forks": 15, - "watchers": 97, + "watchers": 98, "score": 0, "subscribers_count": 4 }, diff --git a/2018/CVE-2018-7600.json b/2018/CVE-2018-7600.json index afa33013bb..21819326dc 100644 --- a/2018/CVE-2018-7600.json +++ b/2018/CVE-2018-7600.json @@ -363,10 +363,10 @@ "description": "Exploit for Drupal 7 <= 7.57 CVE-2018-7600", "fork": false, "created_at": "2018-04-17T15:38:15Z", - "updated_at": "2023-11-05T14:07:08Z", + "updated_at": "2023-11-13T07:41:23Z", "pushed_at": "2018-04-26T15:40:28Z", - "stargazers_count": 116, - "watchers_count": 116, + "stargazers_count": 117, + "watchers_count": 117, "has_discussions": false, "forks_count": 66, "allow_forking": true, @@ -375,7 +375,7 @@ "topics": [], "visibility": "public", "forks": 66, - "watchers": 116, + "watchers": 117, "score": 0, "subscribers_count": 5 }, diff --git a/2018/CVE-2018-8440.json b/2018/CVE-2018-8440.json index 417f3aca37..59c875459e 100644 --- a/2018/CVE-2018-8440.json +++ b/2018/CVE-2018-8440.json @@ -13,10 +13,10 @@ "description": "CVE-2018-8440 standalone exploit", "fork": false, "created_at": "2018-10-31T17:00:43Z", - "updated_at": "2023-10-19T06:40:46Z", + "updated_at": "2023-11-13T06:19:45Z", "pushed_at": "2018-10-31T19:05:17Z", - "stargazers_count": 80, - "watchers_count": 80, + "stargazers_count": 81, + "watchers_count": 81, "has_discussions": false, "forks_count": 27, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 27, - "watchers": 80, + "watchers": 81, "score": 0, "subscribers_count": 6 } diff --git a/2019/CVE-2019-19492.json b/2019/CVE-2019-19492.json index 5cdc2a682a..f650720fd5 100644 --- a/2019/CVE-2019-19492.json +++ b/2019/CVE-2019-19492.json @@ -1,4 +1,34 @@ [ + { + "id": 644570191, + "name": "CVE-2019-19492", + "full_name": "Chocapikk\/CVE-2019-19492", + "owner": { + "login": "Chocapikk", + "id": 88535377, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4", + "html_url": "https:\/\/github.com\/Chocapikk" + }, + "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2019-19492", + "description": "FreeSWITCH Exploit (CVE-2019-19492)", + "fork": false, + "created_at": "2023-05-23T19:53:54Z", + "updated_at": "2023-11-13T09:05:52Z", + "pushed_at": "2023-05-25T18:48:34Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + }, { "id": 644577238, "name": "CVE-2019-19492", diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index 619ac201a4..088a1747ab 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -108,13 +108,13 @@ "stargazers_count": 1095, "watchers_count": 1095, "has_discussions": false, - "forks_count": 284, + "forks_count": 285, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 284, + "forks": 285, "watchers": 1095, "score": 0, "subscribers_count": 35 @@ -170,10 +170,10 @@ "description": "Exploit for zerologon cve-2020-1472", "fork": false, "created_at": "2020-09-14T19:19:07Z", - "updated_at": "2023-11-10T07:02:32Z", + "updated_at": "2023-11-13T08:52:43Z", "pushed_at": "2020-10-15T18:31:15Z", - "stargazers_count": 560, - "watchers_count": 560, + "stargazers_count": 561, + "watchers_count": 561, "has_discussions": false, "forks_count": 144, "allow_forking": true, @@ -182,7 +182,7 @@ "topics": [], "visibility": "public", "forks": 144, - "watchers": 560, + "watchers": 561, "score": 0, "subscribers_count": 14 }, diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index 38635bf87b..b9ac4fe28b 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -851,10 +851,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2023-11-13T03:19:59Z", + "updated_at": "2023-11-13T08:56:00Z", "pushed_at": "2023-10-10T05:38:02Z", - "stargazers_count": 1153, - "watchers_count": 1153, + "stargazers_count": 1155, + "watchers_count": 1155, "has_discussions": false, "forks_count": 149, "allow_forking": true, @@ -870,7 +870,7 @@ ], "visibility": "public", "forks": 149, - "watchers": 1153, + "watchers": 1155, "score": 0, "subscribers_count": 11 } diff --git a/2021/CVE-2021-24155.json b/2021/CVE-2021-24155.json index 397c58cc62..ef965393a4 100644 --- a/2021/CVE-2021-24155.json +++ b/2021/CVE-2021-24155.json @@ -13,10 +13,10 @@ "description": "WordPress Backup Guard Authenticated Remote Code Execution Exploit", "fork": false, "created_at": "2021-07-30T11:28:53Z", - "updated_at": "2023-09-28T11:29:59Z", + "updated_at": "2023-11-13T10:10:35Z", "pushed_at": "2021-07-30T11:35:54Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 12, + "watchers_count": 12, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 11, + "watchers": 12, "score": 0, "subscribers_count": 1 } diff --git a/2021/CVE-2021-35064.json b/2021/CVE-2021-35064.json new file mode 100644 index 0000000000..8aa00b8a69 --- /dev/null +++ b/2021/CVE-2021-35064.json @@ -0,0 +1,32 @@ +[ + { + "id": 498962746, + "name": "CVE-2021-35064", + "full_name": "Chocapikk\/CVE-2021-35064", + "owner": { + "login": "Chocapikk", + "id": 88535377, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4", + "html_url": "https:\/\/github.com\/Chocapikk" + }, + "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2021-35064", + "description": "Python script to exploit CVE-2021-35064 and CVE-2021-36356", + "fork": false, + "created_at": "2022-06-02T02:19:49Z", + "updated_at": "2023-11-13T09:10:54Z", + "pushed_at": "2022-06-02T17:29:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-3560.json b/2021/CVE-2021-3560.json index 4a8ef56af9..ca2dcf9df8 100644 --- a/2021/CVE-2021-3560.json +++ b/2021/CVE-2021-3560.json @@ -322,10 +322,10 @@ "description": "Polkit D-Bus Authentication Bypass Exploit", "fork": false, "created_at": "2021-07-30T11:41:34Z", - "updated_at": "2023-09-28T11:29:59Z", + "updated_at": "2023-11-13T10:10:36Z", "pushed_at": "2021-07-30T11:43:32Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 11, + "watchers_count": 11, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -334,7 +334,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 10, + "watchers": 11, "score": 0, "subscribers_count": 1 }, diff --git a/2021/CVE-2021-36934.json b/2021/CVE-2021-36934.json index 149552a8be..60ab67087e 100644 --- a/2021/CVE-2021-36934.json +++ b/2021/CVE-2021-36934.json @@ -13,10 +13,10 @@ "description": "Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation", "fork": false, "created_at": "2021-07-20T22:16:49Z", - "updated_at": "2023-11-02T09:30:01Z", + "updated_at": "2023-11-13T10:13:46Z", "pushed_at": "2022-01-16T02:09:46Z", - "stargazers_count": 198, - "watchers_count": 198, + "stargazers_count": 199, + "watchers_count": 199, "has_discussions": false, "forks_count": 37, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 37, - "watchers": 198, + "watchers": 199, "score": 0, "subscribers_count": 5 }, diff --git a/2021/CVE-2021-38699.json b/2021/CVE-2021-38699.json index 10f1aec196..65f8b2c1d2 100644 --- a/2021/CVE-2021-38699.json +++ b/2021/CVE-2021-38699.json @@ -13,10 +13,10 @@ "description": "Multiple Reflected XSS in TastyIgniter v3.0.7 Restaurtant CMS", "fork": false, "created_at": "2021-08-12T21:12:04Z", - "updated_at": "2023-10-10T13:10:08Z", + "updated_at": "2023-11-13T10:18:58Z", "pushed_at": "2021-08-17T01:24:12Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 1 }, @@ -43,10 +43,10 @@ "description": "Stored XSS in TastyIgniter v3.0.7 Restaurtant CMS", "fork": false, "created_at": "2021-08-12T22:32:18Z", - "updated_at": "2023-10-10T13:10:12Z", + "updated_at": "2023-11-13T10:18:48Z", "pushed_at": "2021-08-15T23:33:36Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 }, diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json index 04bb0dc443..9032b1364d 100644 --- a/2021/CVE-2021-41773.json +++ b/2021/CVE-2021-41773.json @@ -2727,6 +2727,36 @@ "score": 0, "subscribers_count": 1 }, + { + "id": 480821526, + "name": "CVE-2021-41773", + "full_name": "Chocapikk\/CVE-2021-41773", + "owner": { + "login": "Chocapikk", + "id": 88535377, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4", + "html_url": "https:\/\/github.com\/Chocapikk" + }, + "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2021-41773", + "description": null, + "fork": false, + "created_at": "2022-04-12T13:25:58Z", + "updated_at": "2023-11-13T09:12:47Z", + "pushed_at": "2022-04-12T13:26:22Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + }, { "id": 486245191, "name": "Apache_Penetration_Tool", diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index d68cca307f..47270afb0c 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -2489,10 +2489,10 @@ "description": "Abuse Log4J CVE-2021-44228 to patch CVE-2021-44228 in vulnerable Minecraft game sessions to prevent exploitation in the session :) ", "fork": false, "created_at": "2021-12-12T11:26:42Z", - "updated_at": "2023-09-24T13:17:31Z", + "updated_at": "2023-11-13T10:10:32Z", "pushed_at": "2021-12-12T17:37:11Z", - "stargazers_count": 65, - "watchers_count": 65, + "stargazers_count": 66, + "watchers_count": 66, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -2509,7 +2509,7 @@ ], "visibility": "public", "forks": 4, - "watchers": 65, + "watchers": 66, "score": 0, "subscribers_count": 1 }, diff --git a/2021/CVE-2021-46422.json b/2021/CVE-2021-46422.json index 4ae771f379..44d93eb306 100644 --- a/2021/CVE-2021-46422.json +++ b/2021/CVE-2021-46422.json @@ -29,6 +29,36 @@ "score": 0, "subscribers_count": 1 }, + { + "id": 505571322, + "name": "CVE-2021-46422", + "full_name": "Chocapikk\/CVE-2021-46422", + "owner": { + "login": "Chocapikk", + "id": 88535377, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4", + "html_url": "https:\/\/github.com\/Chocapikk" + }, + "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2021-46422", + "description": "Telesquare SDT-CW3B1 1.1.0 - OS Command Injection", + "fork": false, + "created_at": "2022-06-20T19:24:55Z", + "updated_at": "2023-11-13T09:09:09Z", + "pushed_at": "2022-10-16T15:20:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + }, { "id": 513717270, "name": "CVE-2021-46422_PoC", diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index fa4fc09a50..d0cf54c56a 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -1185,10 +1185,10 @@ "description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.", "fork": false, "created_at": "2022-03-12T20:57:24Z", - "updated_at": "2023-11-12T07:00:08Z", + "updated_at": "2023-11-13T11:07:52Z", "pushed_at": "2023-05-20T05:55:45Z", - "stargazers_count": 468, - "watchers_count": 468, + "stargazers_count": 470, + "watchers_count": 470, "has_discussions": false, "forks_count": 132, "allow_forking": true, @@ -1197,7 +1197,7 @@ "topics": [], "visibility": "public", "forks": 132, - "watchers": 468, + "watchers": 470, "score": 0, "subscribers_count": 15 }, diff --git a/2022/CVE-2022-1015.json b/2022/CVE-2022-1015.json index eff2879ae9..8cb7793cd2 100644 --- a/2022/CVE-2022-1015.json +++ b/2022/CVE-2022-1015.json @@ -18,13 +18,13 @@ "stargazers_count": 187, "watchers_count": 187, "has_discussions": false, - "forks_count": 35, + "forks_count": 36, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 35, + "forks": 36, "watchers": 187, "score": 0, "subscribers_count": 7 diff --git a/2022/CVE-2022-20421.json b/2022/CVE-2022-20421.json index 82e59b8203..cc9360510a 100644 --- a/2022/CVE-2022-20421.json +++ b/2022/CVE-2022-20421.json @@ -13,10 +13,10 @@ "description": "Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)", "fork": false, "created_at": "2023-03-23T10:25:59Z", - "updated_at": "2023-11-11T19:40:42Z", + "updated_at": "2023-11-13T07:27:42Z", "pushed_at": "2023-05-27T15:39:41Z", - "stargazers_count": 198, - "watchers_count": 198, + "stargazers_count": 199, + "watchers_count": 199, "has_discussions": false, "forks_count": 29, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 29, - "watchers": 198, + "watchers": 199, "score": 0, "subscribers_count": 7 } diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json index 818885dbe1..b51507576b 100644 --- a/2022/CVE-2022-22954.json +++ b/2022/CVE-2022-22954.json @@ -542,6 +542,36 @@ "score": 0, "subscribers_count": 2 }, + { + "id": 498873517, + "name": "CVE-2022-22954", + "full_name": "Chocapikk\/CVE-2022-22954", + "owner": { + "login": "Chocapikk", + "id": 88535377, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4", + "html_url": "https:\/\/github.com\/Chocapikk" + }, + "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-22954", + "description": "Python script to exploit CVE-2022-22954 and then exploit CVE-2022-22960", + "fork": false, + "created_at": "2022-06-01T19:33:32Z", + "updated_at": "2023-11-13T09:12:28Z", + "pushed_at": "2022-06-01T23:50:18Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + }, { "id": 498898344, "name": "CVE-2022-22954", @@ -766,10 +796,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2023-11-13T03:19:59Z", + "updated_at": "2023-11-13T08:56:00Z", "pushed_at": "2023-10-10T05:38:02Z", - "stargazers_count": 1153, - "watchers_count": 1153, + "stargazers_count": 1155, + "watchers_count": 1155, "has_discussions": false, "forks_count": 149, "allow_forking": true, @@ -785,7 +815,7 @@ ], "visibility": "public", "forks": 149, - "watchers": 1153, + "watchers": 1155, "score": 0, "subscribers_count": 11 }, diff --git a/2022/CVE-2022-23808.json b/2022/CVE-2022-23808.json index 7044ffbc8f..e0928a08b5 100644 --- a/2022/CVE-2022-23808.json +++ b/2022/CVE-2022-23808.json @@ -13,10 +13,10 @@ "description": "phpMyAdmin XSS ", "fork": false, "created_at": "2022-02-01T17:02:03Z", - "updated_at": "2023-09-28T11:35:32Z", + "updated_at": "2023-11-13T10:32:41Z", "pushed_at": "2022-02-03T16:21:01Z", - "stargazers_count": 110, - "watchers_count": 110, + "stargazers_count": 109, + "watchers_count": 109, "has_discussions": false, "forks_count": 24, "allow_forking": true, @@ -43,7 +43,7 @@ ], "visibility": "public", "forks": 24, - "watchers": 110, + "watchers": 109, "score": 0, "subscribers_count": 3 } diff --git a/2022/CVE-2022-24227.json b/2022/CVE-2022-24227.json new file mode 100644 index 0000000000..818479a1f1 --- /dev/null +++ b/2022/CVE-2022-24227.json @@ -0,0 +1,32 @@ +[ + { + "id": 718130267, + "name": "CVE-2022-24227-updated", + "full_name": "Cyber-Wo0dy\/CVE-2022-24227-updated", + "owner": { + "login": "Cyber-Wo0dy", + "id": 148460873, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148460873?v=4", + "html_url": "https:\/\/github.com\/Cyber-Wo0dy" + }, + "html_url": "https:\/\/github.com\/Cyber-Wo0dy\/CVE-2022-24227-updated", + "description": "CVE-2022-24227 [Updated]: BoltWire v8.00 vulnerable to \"Stored Cross-site Scripting (XSS)\"", + "fork": false, + "created_at": "2023-11-13T12:53:56Z", + "updated_at": "2023-11-13T12:56:26Z", + "pushed_at": "2023-11-13T12:54:39Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-2588.json b/2022/CVE-2022-2588.json index 0cfe955bfa..f4f4a4fcb0 100644 --- a/2022/CVE-2022-2588.json +++ b/2022/CVE-2022-2588.json @@ -133,10 +133,10 @@ "description": "A PoC for CVE-2022-2588 that triggers a WARNING", "fork": false, "created_at": "2022-09-18T21:35:19Z", - "updated_at": "2023-09-28T11:42:50Z", + "updated_at": "2023-11-13T07:45:26Z", "pushed_at": "2022-09-28T22:33:17Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 11, + "watchers_count": 11, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -145,7 +145,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 10, + "watchers": 11, "score": 0, "subscribers_count": 2 }, diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index a03b5c3b9f..28e963cebd 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -1021,6 +1021,36 @@ "score": 0, "subscribers_count": 2 }, + { + "id": 503139905, + "name": "CVE-2022-26134", + "full_name": "Chocapikk\/CVE-2022-26134", + "owner": { + "login": "Chocapikk", + "id": 88535377, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4", + "html_url": "https:\/\/github.com\/Chocapikk" + }, + "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-26134", + "description": "CVE-2022-26134 - Pre-Auth Remote Code Execution via OGNL Injection", + "fork": false, + "created_at": "2022-06-13T23:01:39Z", + "updated_at": "2023-11-13T09:08:06Z", + "pushed_at": "2022-10-19T16:27:48Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + }, { "id": 505123172, "name": "CVE-2022-26134", diff --git a/2022/CVE-2022-27925.json b/2022/CVE-2022-27925.json index 89704cb0a2..d86c431632 100644 --- a/2022/CVE-2022-27925.json +++ b/2022/CVE-2022-27925.json @@ -160,6 +160,36 @@ "score": 0, "subscribers_count": 2 }, + { + "id": 529394141, + "name": "CVE-2022-27925-Revshell", + "full_name": "Chocapikk\/CVE-2022-27925-Revshell", + "owner": { + "login": "Chocapikk", + "id": 88535377, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4", + "html_url": "https:\/\/github.com\/Chocapikk" + }, + "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-27925-Revshell", + "description": "Python Script to exploit Zimbra Auth Bypass + RCE (CVE-2022-27925)", + "fork": false, + "created_at": "2022-08-26T20:19:48Z", + "updated_at": "2023-11-13T09:10:29Z", + "pushed_at": "2022-09-17T16:56:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 2 + }, { "id": 535575434, "name": "CVE-2022-27925", diff --git a/2022/CVE-2022-29303.json b/2022/CVE-2022-29303.json index 4b22fa1bd9..48c2acc542 100644 --- a/2022/CVE-2022-29303.json +++ b/2022/CVE-2022-29303.json @@ -1,4 +1,34 @@ [ + { + "id": 498521480, + "name": "CVE-2022-29303", + "full_name": "Chocapikk\/CVE-2022-29303", + "owner": { + "login": "Chocapikk", + "id": 88535377, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4", + "html_url": "https:\/\/github.com\/Chocapikk" + }, + "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-29303", + "description": "Python script to exploit CVE-2022-29303 ", + "fork": false, + "created_at": "2022-05-31T22:55:05Z", + "updated_at": "2023-11-13T09:11:39Z", + "pushed_at": "2022-05-31T23:10:13Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + }, { "id": 498647437, "name": "CVE-2022-29303", diff --git a/2022/CVE-2022-29464.json b/2022/CVE-2022-29464.json index 1ffdbf3ccf..f835459ac8 100644 --- a/2022/CVE-2022-29464.json +++ b/2022/CVE-2022-29464.json @@ -441,6 +441,36 @@ "score": 0, "subscribers_count": 1 }, + { + "id": 496760787, + "name": "CVE-2022-29464", + "full_name": "Chocapikk\/CVE-2022-29464", + "owner": { + "login": "Chocapikk", + "id": 88535377, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4", + "html_url": "https:\/\/github.com\/Chocapikk" + }, + "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-29464", + "description": "Python script to exploit CVE-2022-29464 (mass mode)", + "fork": false, + "created_at": "2022-05-26T20:19:53Z", + "updated_at": "2023-11-13T09:12:01Z", + "pushed_at": "2022-06-01T03:29:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + }, { "id": 499883723, "name": "Better-CVE-2022-29464", diff --git a/2022/CVE-2022-30525.json b/2022/CVE-2022-30525.json index 2ded78bc00..dfe3627398 100644 --- a/2022/CVE-2022-30525.json +++ b/2022/CVE-2022-30525.json @@ -214,6 +214,36 @@ "score": 0, "subscribers_count": 2 }, + { + "id": 493718813, + "name": "CVE-2022-30525-Reverse-Shell", + "full_name": "Chocapikk\/CVE-2022-30525-Reverse-Shell", + "owner": { + "login": "Chocapikk", + "id": 88535377, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4", + "html_url": "https:\/\/github.com\/Chocapikk" + }, + "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-30525-Reverse-Shell", + "description": "Simple python script to exploit CVE-2022-30525 (FIXED): Zyxel Firewall Unauthenticated Remote Command Injection", + "fork": false, + "created_at": "2022-05-18T15:22:17Z", + "updated_at": "2023-11-13T09:11:12Z", + "pushed_at": "2022-05-19T11:29:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + }, { "id": 494055901, "name": "CVE-2022-30525", diff --git a/2022/CVE-2022-31814.json b/2022/CVE-2022-31814.json index a4452a9e2c..addc54332e 100644 --- a/2022/CVE-2022-31814.json +++ b/2022/CVE-2022-31814.json @@ -134,6 +134,36 @@ "score": 0, "subscribers_count": 1 }, + { + "id": 618996369, + "name": "CVE-2022-31814", + "full_name": "Chocapikk\/CVE-2022-31814", + "owner": { + "login": "Chocapikk", + "id": 88535377, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4", + "html_url": "https:\/\/github.com\/Chocapikk" + }, + "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-31814", + "description": "pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)", + "fork": false, + "created_at": "2023-03-26T00:18:04Z", + "updated_at": "2023-11-13T09:06:37Z", + "pushed_at": "2023-03-26T00:25:48Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + }, { "id": 619242757, "name": "CVE-2022-31814", diff --git a/2022/CVE-2022-36804.json b/2022/CVE-2022-36804.json index aa8c80cdb5..dacd53de63 100644 --- a/2022/CVE-2022-36804.json +++ b/2022/CVE-2022-36804.json @@ -194,6 +194,36 @@ "score": 0, "subscribers_count": 2 }, + { + "id": 540400573, + "name": "CVE-2022-36804-ReverseShell", + "full_name": "Chocapikk\/CVE-2022-36804-ReverseShell", + "owner": { + "login": "Chocapikk", + "id": 88535377, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4", + "html_url": "https:\/\/github.com\/Chocapikk" + }, + "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-36804-ReverseShell", + "description": "PoC exploit for CVE-2022-36804 (BitBucket Critical Command Injection)", + "fork": false, + "created_at": "2022-09-23T11:05:22Z", + "updated_at": "2023-11-13T09:09:34Z", + "pushed_at": "2022-09-24T15:19:38Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + }, { "id": 540713828, "name": "CVE-2022-36804", diff --git a/2022/CVE-2022-39952.json b/2022/CVE-2022-39952.json index e39ee8c30b..844d58df3a 100644 --- a/2022/CVE-2022-39952.json +++ b/2022/CVE-2022-39952.json @@ -59,6 +59,36 @@ "score": 0, "subscribers_count": 1 }, + { + "id": 606840385, + "name": "CVE-2022-39952", + "full_name": "Chocapikk\/CVE-2022-39952", + "owner": { + "login": "Chocapikk", + "id": 88535377, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4", + "html_url": "https:\/\/github.com\/Chocapikk" + }, + "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-39952", + "description": "PoC for CVE-2022-39952 affecting Fortinet FortiNAC.", + "fork": false, + "created_at": "2023-02-26T18:10:04Z", + "updated_at": "2023-11-13T09:07:00Z", + "pushed_at": "2023-02-26T18:13:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 2 + }, { "id": 619925116, "name": "CVE-2022-39952-better", diff --git a/2022/CVE-2022-40684.json b/2022/CVE-2022-40684.json index 774081344f..5d4bcce3fa 100644 --- a/2022/CVE-2022-40684.json +++ b/2022/CVE-2022-40684.json @@ -249,6 +249,36 @@ "score": 0, "subscribers_count": 1 }, + { + "id": 552028942, + "name": "CVE-2022-40684", + "full_name": "Chocapikk\/CVE-2022-40684", + "owner": { + "login": "Chocapikk", + "id": 88535377, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4", + "html_url": "https:\/\/github.com\/Chocapikk" + }, + "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-40684", + "description": "Fortinet Critical Authentication Bypass Vulnerability (CVE-2022-40684) [ Mass Exploit ]", + "fork": false, + "created_at": "2022-10-15T16:51:25Z", + "updated_at": "2023-11-13T09:08:42Z", + "pushed_at": "2022-10-19T16:27:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + }, { "id": 552033176, "name": "CVE-2022-40684", diff --git a/2022/CVE-2022-44268.json b/2022/CVE-2022-44268.json index 2651342640..77660215b3 100644 --- a/2022/CVE-2022-44268.json +++ b/2022/CVE-2022-44268.json @@ -13,10 +13,10 @@ "description": "CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator", "fork": false, "created_at": "2023-02-02T15:34:28Z", - "updated_at": "2023-11-03T07:36:31Z", + "updated_at": "2023-11-13T07:30:55Z", "pushed_at": "2023-02-02T16:53:37Z", - "stargazers_count": 262, - "watchers_count": 262, + "stargazers_count": 263, + "watchers_count": 263, "has_discussions": false, "forks_count": 42, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 42, - "watchers": 262, + "watchers": 263, "score": 0, "subscribers_count": 3 }, diff --git a/2022/CVE-2022-44877.json b/2022/CVE-2022-44877.json index 10755d857a..259b3d822f 100644 --- a/2022/CVE-2022-44877.json +++ b/2022/CVE-2022-44877.json @@ -89,6 +89,36 @@ "score": 0, "subscribers_count": 2 }, + { + "id": 600549630, + "name": "CVE-2022-44877", + "full_name": "Chocapikk\/CVE-2022-44877", + "owner": { + "login": "Chocapikk", + "id": 88535377, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4", + "html_url": "https:\/\/github.com\/Chocapikk" + }, + "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-44877", + "description": "Bash Script for Checking Command Injection Vulnerability on CentOS Web Panel [CWP] (CVE-2022-44877)", + "fork": false, + "created_at": "2023-02-11T20:45:08Z", + "updated_at": "2023-11-13T09:07:19Z", + "pushed_at": "2023-02-11T22:03:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + }, { "id": 602139288, "name": "CVE-2022-44877-white-box", diff --git a/2023/CVE-2023-1698.json b/2023/CVE-2023-1698.json index 248e5c1d01..b9cf669350 100644 --- a/2023/CVE-2023-1698.json +++ b/2023/CVE-2023-1698.json @@ -1,4 +1,34 @@ [ + { + "id": 692207494, + "name": "CVE-2023-1698", + "full_name": "Chocapikk\/CVE-2023-1698", + "owner": { + "login": "Chocapikk", + "id": 88535377, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4", + "html_url": "https:\/\/github.com\/Chocapikk" + }, + "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-1698", + "description": "WAGO Remote Exploit Tool for CVE-2023-1698", + "fork": false, + "created_at": "2023-09-15T20:06:31Z", + "updated_at": "2023-11-13T09:02:08Z", + "pushed_at": "2023-09-15T20:07:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + }, { "id": 707534264, "name": "CVE-2023-1698", diff --git a/2023/CVE-2023-20209.json b/2023/CVE-2023-20209.json index 9c0ae6d137..cd09078fe2 100644 --- a/2023/CVE-2023-20209.json +++ b/2023/CVE-2023-20209.json @@ -18,13 +18,13 @@ "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 0, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 4, "watchers": 0, "score": 0, "subscribers_count": 0 diff --git a/2023/CVE-2023-21707.json b/2023/CVE-2023-21707.json index 65440df7b3..44dd6ec525 100644 --- a/2023/CVE-2023-21707.json +++ b/2023/CVE-2023-21707.json @@ -13,10 +13,10 @@ "description": "CVE-2023-21707 EXP", "fork": false, "created_at": "2023-06-30T10:15:07Z", - "updated_at": "2023-11-10T08:48:47Z", + "updated_at": "2023-11-13T12:17:24Z", "pushed_at": "2023-07-06T07:43:24Z", - "stargazers_count": 20, - "watchers_count": 20, + "stargazers_count": 21, + "watchers_count": 21, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 8, - "watchers": 20, + "watchers": 21, "score": 0, "subscribers_count": 3 } diff --git a/2023/CVE-2023-21839.json b/2023/CVE-2023-21839.json index ae2f75b9bd..16b2a91e91 100644 --- a/2023/CVE-2023-21839.json +++ b/2023/CVE-2023-21839.json @@ -43,7 +43,7 @@ "description": "Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)", "fork": false, "created_at": "2023-02-24T13:54:42Z", - "updated_at": "2023-10-27T14:57:30Z", + "updated_at": "2023-11-13T07:24:11Z", "pushed_at": "2023-02-24T13:29:38Z", "stargazers_count": 2, "watchers_count": 2, diff --git a/2023/CVE-2023-22515.json b/2023/CVE-2023-22515.json index 97e70edd05..090b51d3a0 100644 --- a/2023/CVE-2023-22515.json +++ b/2023/CVE-2023-22515.json @@ -112,10 +112,10 @@ "description": "Confluence未授权添加管理员用户(CVE-2023-22515)漏洞利用工具", "fork": false, "created_at": "2023-10-11T08:42:17Z", - "updated_at": "2023-11-11T14:58:24Z", + "updated_at": "2023-11-13T12:37:27Z", "pushed_at": "2023-10-16T02:24:02Z", - "stargazers_count": 77, - "watchers_count": 77, + "stargazers_count": 80, + "watchers_count": 80, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -124,7 +124,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 77, + "watchers": 80, "score": 0, "subscribers_count": 3 }, @@ -309,13 +309,13 @@ "stargazers_count": 13, "watchers_count": 13, "has_discussions": false, - "forks_count": 2, + "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 2, + "forks": 3, "watchers": 13, "score": 0, "subscribers_count": 1 diff --git a/2023/CVE-2023-22518.json b/2023/CVE-2023-22518.json index 29fc0e71ba..95ae6f6779 100644 --- a/2023/CVE-2023-22518.json +++ b/2023/CVE-2023-22518.json @@ -103,10 +103,10 @@ "description": "Exploit CVE-2023-22518", "fork": false, "created_at": "2023-11-09T06:56:18Z", - "updated_at": "2023-11-09T07:54:32Z", + "updated_at": "2023-11-13T10:48:36Z", "pushed_at": "2023-11-09T07:42:04Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -120,7 +120,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-27363.json b/2023/CVE-2023-27363.json index dfffa9349d..364c115bb6 100644 --- a/2023/CVE-2023-27363.json +++ b/2023/CVE-2023-27363.json @@ -43,10 +43,10 @@ "description": "福昕Foxit PDF远程代码执行漏洞CVE-2023-27363分析与复现", "fork": false, "created_at": "2023-06-14T01:18:09Z", - "updated_at": "2023-06-16T01:30:41Z", + "updated_at": "2023-11-13T09:01:36Z", "pushed_at": "2023-07-06T06:34:50Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 8, + "watchers": 9, "score": 0, "subscribers_count": 3 }, diff --git a/2023/CVE-2023-27372.json b/2023/CVE-2023-27372.json index 06209e3bba..9b7f67c330 100644 --- a/2023/CVE-2023-27372.json +++ b/2023/CVE-2023-27372.json @@ -44,6 +44,36 @@ "score": 0, "subscribers_count": 1 }, + { + "id": 658452469, + "name": "CVE-2023-27372", + "full_name": "Chocapikk\/CVE-2023-27372", + "owner": { + "login": "Chocapikk", + "id": 88535377, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4", + "html_url": "https:\/\/github.com\/Chocapikk" + }, + "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-27372", + "description": "SPIP Vulnerability Scanner - CVE-2023-27372 Detector", + "fork": false, + "created_at": "2023-06-25T19:30:08Z", + "updated_at": "2023-11-13T09:01:41Z", + "pushed_at": "2023-09-16T23:13:58Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + }, { "id": 662629965, "name": "CVE-2023-27372-PoC", diff --git a/2023/CVE-2023-28229.json b/2023/CVE-2023-28229.json index c6d81fcfed..089a3a1d80 100644 --- a/2023/CVE-2023-28229.json +++ b/2023/CVE-2023-28229.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2023-09-04T07:48:13Z", - "updated_at": "2023-10-16T08:02:30Z", + "updated_at": "2023-11-13T09:07:44Z", "pushed_at": "2023-09-04T07:51:58Z", - "stargazers_count": 106, - "watchers_count": 106, + "stargazers_count": 107, + "watchers_count": 107, "has_discussions": false, "forks_count": 28, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 28, - "watchers": 106, + "watchers": 107, "score": 0, "subscribers_count": 2 } diff --git a/2023/CVE-2023-28252.json b/2023/CVE-2023-28252.json index 1b49d99bb2..185eb9af43 100644 --- a/2023/CVE-2023-28252.json +++ b/2023/CVE-2023-28252.json @@ -28,5 +28,35 @@ "watchers": 147, "score": 0, "subscribers_count": 2 + }, + { + "id": 718019226, + "name": "CVE-2023-28252-", + "full_name": "Danasuley\/CVE-2023-28252-", + "owner": { + "login": "Danasuley", + "id": 148750257, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148750257?v=4", + "html_url": "https:\/\/github.com\/Danasuley" + }, + "html_url": "https:\/\/github.com\/Danasuley\/CVE-2023-28252-", + "description": "Обнаружение эксплойта CVE-2023-28252 ", + "fork": false, + "created_at": "2023-11-13T07:46:38Z", + "updated_at": "2023-11-13T07:46:39Z", + "pushed_at": "2023-11-13T07:55:22Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-28432.json b/2023/CVE-2023-28432.json index 0757019fa5..187e0cdb09 100644 --- a/2023/CVE-2023-28432.json +++ b/2023/CVE-2023-28432.json @@ -392,6 +392,36 @@ "score": 0, "subscribers_count": 1 }, + { + "id": 687511506, + "name": "CVE-2023-28432", + "full_name": "Chocapikk\/CVE-2023-28432", + "owner": { + "login": "Chocapikk", + "id": 88535377, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4", + "html_url": "https:\/\/github.com\/Chocapikk" + }, + "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-28432", + "description": "Automated vulnerability scanner for CVE-2023-28432 in Minio deployments, revealing sensitive environment variables.", + "fork": false, + "created_at": "2023-09-05T14:01:53Z", + "updated_at": "2023-11-13T09:02:41Z", + "pushed_at": "2023-09-05T14:02:34Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + }, { "id": 707634565, "name": "CVE-2023-28432", diff --git a/2023/CVE-2023-32629.json b/2023/CVE-2023-32629.json index ba2c66ddde..a387a6094b 100644 --- a/2023/CVE-2023-32629.json +++ b/2023/CVE-2023-32629.json @@ -43,10 +43,10 @@ "description": "Ubuntu Privilege Escalation bash one-liner using CVE-2023-32629 & CVE-2023-2640", "fork": false, "created_at": "2023-11-09T09:19:23Z", - "updated_at": "2023-11-12T00:26:06Z", + "updated_at": "2023-11-13T12:12:09Z", "pushed_at": "2023-11-09T09:21:12Z", - "stargazers_count": 26, - "watchers_count": 26, + "stargazers_count": 27, + "watchers_count": 27, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 26, + "watchers": 27, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-33617.json b/2023/CVE-2023-33617.json index 7b9f48f82f..59707e65c8 100644 --- a/2023/CVE-2023-33617.json +++ b/2023/CVE-2023-33617.json @@ -1,4 +1,34 @@ [ + { + "id": 645969054, + "name": "CVE-2023-33617", + "full_name": "Chocapikk\/CVE-2023-33617", + "owner": { + "login": "Chocapikk", + "id": 88535377, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4", + "html_url": "https:\/\/github.com\/Chocapikk" + }, + "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-33617", + "description": "Authenticated OS command injection vulnerability (CVE-2023-33617)", + "fork": false, + "created_at": "2023-05-26T22:16:00Z", + "updated_at": "2023-11-13T09:05:24Z", + "pushed_at": "2023-05-26T22:29:12Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 2 + }, { "id": 645969733, "name": "CVE-2023-33617", diff --git a/2023/CVE-2023-34050.json b/2023/CVE-2023-34050.json index 2d4fedbf50..7068825440 100644 --- a/2023/CVE-2023-34050.json +++ b/2023/CVE-2023-34050.json @@ -18,13 +18,13 @@ "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 4, "score": 0, "subscribers_count": 2 diff --git a/2023/CVE-2023-34362.json b/2023/CVE-2023-34362.json index 4f09fd4d47..9e76b0d513 100644 --- a/2023/CVE-2023-34362.json +++ b/2023/CVE-2023-34362.json @@ -48,13 +48,13 @@ "stargazers_count": 129, "watchers_count": 129, "has_discussions": false, - "forks_count": 32, + "forks_count": 33, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 32, + "forks": 33, "watchers": 129, "score": 0, "subscribers_count": 5 diff --git a/2023/CVE-2023-35082.json b/2023/CVE-2023-35082.json new file mode 100644 index 0000000000..b5476ed9e2 --- /dev/null +++ b/2023/CVE-2023-35082.json @@ -0,0 +1,32 @@ +[ + { + "id": 674733856, + "name": "CVE-2023-35082", + "full_name": "Chocapikk\/CVE-2023-35082", + "owner": { + "login": "Chocapikk", + "id": 88535377, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4", + "html_url": "https:\/\/github.com\/Chocapikk" + }, + "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-35082", + "description": "Remote Unauthenticated API Access Vulnerability in MobileIron Core 11.2 and older", + "fork": false, + "created_at": "2023-08-04T16:25:24Z", + "updated_at": "2023-11-13T09:04:26Z", + "pushed_at": "2023-08-07T18:56:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-3519.json b/2023/CVE-2023-3519.json index f4c02e8851..3e3a68416b 100644 --- a/2023/CVE-2023-3519.json +++ b/2023/CVE-2023-3519.json @@ -338,6 +338,36 @@ "score": 0, "subscribers_count": 7 }, + { + "id": 682553540, + "name": "CVE-2023-3519", + "full_name": "Chocapikk\/CVE-2023-3519", + "owner": { + "login": "Chocapikk", + "id": 88535377, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4", + "html_url": "https:\/\/github.com\/Chocapikk" + }, + "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-3519", + "description": "Citrix ADC RCE CVE-2023-3519", + "fork": false, + "created_at": "2023-08-24T12:24:24Z", + "updated_at": "2023-11-13T09:03:16Z", + "pushed_at": "2023-08-30T15:47:22Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + }, { "id": 685454983, "name": "CVE-2023-3519-BackdoorCheck", diff --git a/2023/CVE-2023-35885.json b/2023/CVE-2023-35885.json index 00a4e52980..b32602aadb 100644 --- a/2023/CVE-2023-35885.json +++ b/2023/CVE-2023-35885.json @@ -28,5 +28,35 @@ "watchers": 52, "score": 0, "subscribers_count": 2 + }, + { + "id": 684030388, + "name": "CVE-2023-35885", + "full_name": "Chocapikk\/CVE-2023-35885", + "owner": { + "login": "Chocapikk", + "id": 88535377, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4", + "html_url": "https:\/\/github.com\/Chocapikk" + }, + "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-35885", + "description": "CloudPanel 2 Remote Code Execution Exploit", + "fork": false, + "created_at": "2023-08-28T09:58:41Z", + "updated_at": "2023-11-13T09:04:03Z", + "pushed_at": "2023-08-28T12:29:21Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-36745.json b/2023/CVE-2023-36745.json index f241997cb1..be93f68027 100644 --- a/2023/CVE-2023-36745.json +++ b/2023/CVE-2023-36745.json @@ -13,19 +13,19 @@ "description": null, "fork": false, "created_at": "2023-10-23T19:06:36Z", - "updated_at": "2023-11-12T03:35:13Z", + "updated_at": "2023-11-13T12:20:04Z", "pushed_at": "2023-10-29T11:12:26Z", - "stargazers_count": 113, - "watchers_count": 113, + "stargazers_count": 116, + "watchers_count": 116, "has_discussions": false, - "forks_count": 40, + "forks_count": 41, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 40, - "watchers": 113, + "forks": 41, + "watchers": 116, "score": 0, "subscribers_count": 5 } diff --git a/2023/CVE-2023-36846.json b/2023/CVE-2023-36846.json index 8b146bbecc..172d10f1f8 100644 --- a/2023/CVE-2023-36846.json +++ b/2023/CVE-2023-36846.json @@ -1,4 +1,34 @@ [ + { + "id": 684738638, + "name": "CVE-2023-36846", + "full_name": "Chocapikk\/CVE-2023-36846", + "owner": { + "login": "Chocapikk", + "id": 88535377, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4", + "html_url": "https:\/\/github.com\/Chocapikk" + }, + "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-36846", + "description": "Remote Code Execution on Junos OS CVE-2023-36846", + "fork": false, + "created_at": "2023-08-29T18:50:49Z", + "updated_at": "2023-11-13T09:03:38Z", + "pushed_at": "2023-08-29T18:51:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + }, { "id": 694700558, "name": "CVE-2023-36846", diff --git a/2023/CVE-2023-38646.json b/2023/CVE-2023-38646.json index e689d7f73d..e434d08c6e 100644 --- a/2023/CVE-2023-38646.json +++ b/2023/CVE-2023-38646.json @@ -95,6 +95,36 @@ "score": 0, "subscribers_count": 1 }, + { + "id": 672405863, + "name": "CVE-2023-38646", + "full_name": "Chocapikk\/CVE-2023-38646", + "owner": { + "login": "Chocapikk", + "id": 88535377, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4", + "html_url": "https:\/\/github.com\/Chocapikk" + }, + "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-38646", + "description": "Remote Code Execution on Metabase CVE-2023-38646", + "fork": false, + "created_at": "2023-07-30T01:12:24Z", + "updated_at": "2023-11-13T09:05:01Z", + "pushed_at": "2023-07-30T01:12:52Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + }, { "id": 672496252, "name": "CVE-2023-38646-Poc", diff --git a/2023/CVE-2023-38831.json b/2023/CVE-2023-38831.json index 07c0ddc95b..382d52e92e 100644 --- a/2023/CVE-2023-38831.json +++ b/2023/CVE-2023-38831.json @@ -43,10 +43,10 @@ "description": "CVE-2023-38831 winrar exploit generator", "fork": false, "created_at": "2023-08-25T09:44:08Z", - "updated_at": "2023-11-10T12:32:25Z", + "updated_at": "2023-11-13T09:29:29Z", "pushed_at": "2023-11-06T10:49:40Z", - "stargazers_count": 703, - "watchers_count": 703, + "stargazers_count": 704, + "watchers_count": 704, "has_discussions": false, "forks_count": 128, "allow_forking": true, @@ -59,7 +59,7 @@ ], "visibility": "public", "forks": 128, - "watchers": 703, + "watchers": 704, "score": 0, "subscribers_count": 8 }, diff --git a/2023/CVE-2023-39526.json b/2023/CVE-2023-39526.json index 37c004ce70..7378893f22 100644 --- a/2023/CVE-2023-39526.json +++ b/2023/CVE-2023-39526.json @@ -13,10 +13,10 @@ "description": "Prestashop fix vulnerability CVE-2023-39526 & CVE-2023-39527", "fork": false, "created_at": "2023-08-10T16:51:56Z", - "updated_at": "2023-10-20T08:34:18Z", + "updated_at": "2023-11-13T10:41:25Z", "pushed_at": "2023-08-10T16:57:43Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-42793.json b/2023/CVE-2023-42793.json index a80b741b6c..98f5751edb 100644 --- a/2023/CVE-2023-42793.json +++ b/2023/CVE-2023-42793.json @@ -13,12 +13,12 @@ "description": "CVE-2023-42793", "fork": false, "created_at": "2023-09-29T06:43:35Z", - "updated_at": "2023-10-31T15:03:28Z", + "updated_at": "2023-11-13T10:30:47Z", "pushed_at": "2023-09-29T06:52:00Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 11, + "watchers_count": 11, "has_discussions": false, - "forks_count": 2, + "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -26,8 +26,8 @@ "cve-2023-42793" ], "visibility": "public", - "forks": 2, - "watchers": 10, + "forks": 3, + "watchers": 11, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-42820.json b/2023/CVE-2023-42820.json index aedee76a78..9cd5324b98 100644 --- a/2023/CVE-2023-42820.json +++ b/2023/CVE-2023-42820.json @@ -43,10 +43,10 @@ "description": "CVE-2023-42820", "fork": false, "created_at": "2023-10-10T06:32:51Z", - "updated_at": "2023-11-09T12:11:14Z", + "updated_at": "2023-11-13T06:38:38Z", "pushed_at": "2023-10-29T12:12:32Z", - "stargazers_count": 46, - "watchers_count": 46, + "stargazers_count": 47, + "watchers_count": 47, "has_discussions": false, "forks_count": 10, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 10, - "watchers": 46, + "watchers": 47, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-44487.json b/2023/CVE-2023-44487.json index 90f20d8613..ece304a9c5 100644 --- a/2023/CVE-2023-44487.json +++ b/2023/CVE-2023-44487.json @@ -171,10 +171,10 @@ "description": "A python based exploit to test out rapid reset attack (CVE-2023-44487)", "fork": false, "created_at": "2023-10-16T11:07:50Z", - "updated_at": "2023-10-27T15:01:43Z", + "updated_at": "2023-11-13T11:04:08Z", "pushed_at": "2023-10-16T12:32:50Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -193,7 +193,7 @@ ], "visibility": "public", "forks": 2, - "watchers": 7, + "watchers": 8, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-46604.json b/2023/CVE-2023-46604.json index c13e91ea18..101e754a1f 100644 --- a/2023/CVE-2023-46604.json +++ b/2023/CVE-2023-46604.json @@ -13,10 +13,10 @@ "description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具, 基于 Go 语言", "fork": false, "created_at": "2023-10-27T05:57:21Z", - "updated_at": "2023-11-12T10:09:10Z", + "updated_at": "2023-11-13T08:15:51Z", "pushed_at": "2023-11-03T12:50:06Z", - "stargazers_count": 141, - "watchers_count": 141, + "stargazers_count": 142, + "watchers_count": 142, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 16, - "watchers": 141, + "watchers": 142, "score": 0, "subscribers_count": 3 }, @@ -225,10 +225,10 @@ "description": "This script leverages CVE-2023046604 (Apache ActiveMQ) to generate a pseudo shell. The vulnerability allows for remote code execution due to unsafe deserialization within the OpenWire protocol.", "fork": false, "created_at": "2023-11-12T11:26:46Z", - "updated_at": "2023-11-12T15:09:34Z", + "updated_at": "2023-11-13T09:41:31Z", "pushed_at": "2023-11-12T13:50:09Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -237,7 +237,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-46747.json b/2023/CVE-2023-46747.json index 3b79bdf049..08fdb58754 100644 --- a/2023/CVE-2023-46747.json +++ b/2023/CVE-2023-46747.json @@ -43,10 +43,10 @@ "description": "exploit for cve-2023-46747", "fork": false, "created_at": "2023-11-01T09:31:05Z", - "updated_at": "2023-11-10T16:59:29Z", + "updated_at": "2023-11-13T10:09:32Z", "pushed_at": "2023-11-10T02:12:38Z", - "stargazers_count": 105, - "watchers_count": 105, + "stargazers_count": 106, + "watchers_count": 106, "has_discussions": false, "forks_count": 25, "allow_forking": true, @@ -61,7 +61,7 @@ ], "visibility": "public", "forks": 25, - "watchers": 105, + "watchers": 106, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-47129.json b/2023/CVE-2023-47129.json new file mode 100644 index 0000000000..214358cc23 --- /dev/null +++ b/2023/CVE-2023-47129.json @@ -0,0 +1,32 @@ +[ + { + "id": 718117758, + "name": "CVE-2023-47129", + "full_name": "Cyber-Wo0dy\/CVE-2023-47129", + "owner": { + "login": "Cyber-Wo0dy", + "id": 148460873, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148460873?v=4", + "html_url": "https:\/\/github.com\/Cyber-Wo0dy" + }, + "html_url": "https:\/\/github.com\/Cyber-Wo0dy\/CVE-2023-47129", + "description": "Statamic CMS versions <4.33.0 vulnerable to \"Remote Code Execution\" ", + "fork": false, + "created_at": "2023-11-13T12:21:52Z", + "updated_at": "2023-11-13T12:25:09Z", + "pushed_at": "2023-11-13T12:24:03Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-47529.json b/2023/CVE-2023-47529.json new file mode 100644 index 0000000000..73e8c539bb --- /dev/null +++ b/2023/CVE-2023-47529.json @@ -0,0 +1,32 @@ +[ + { + "id": 718085174, + "name": "CVE-2023-47529", + "full_name": "RandomRobbieBF\/CVE-2023-47529", + "owner": { + "login": "RandomRobbieBF", + "id": 51722811, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", + "html_url": "https:\/\/github.com\/RandomRobbieBF" + }, + "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2023-47529", + "description": "Cloud Templates & Patterns collection <= 1.2.2 - Sensitive Information Exposure via Log File", + "fork": false, + "created_at": "2023-11-13T10:50:25Z", + "updated_at": "2023-11-13T10:50:26Z", + "pushed_at": "2023-11-13T10:51:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-4911.json b/2023/CVE-2023-4911.json index 4e36cb0a80..e16f2fc4fa 100644 --- a/2023/CVE-2023-4911.json +++ b/2023/CVE-2023-4911.json @@ -347,7 +347,7 @@ "description": "Looney Tunables CVE-2023-4911", "fork": false, "created_at": "2023-11-08T09:34:04Z", - "updated_at": "2023-11-09T07:19:14Z", + "updated_at": "2023-11-13T08:09:54Z", "pushed_at": "2023-11-08T09:40:31Z", "stargazers_count": 1, "watchers_count": 1, diff --git a/2023/CVE-2023-5360.json b/2023/CVE-2023-5360.json index a364c6130f..78861664d1 100644 --- a/2023/CVE-2023-5360.json +++ b/2023/CVE-2023-5360.json @@ -221,5 +221,37 @@ "watchers": 1, "score": 0, "subscribers_count": 1 + }, + { + "id": 718129350, + "name": "CVE-2023-5360", + "full_name": "1337r0j4n\/CVE-2023-5360", + "owner": { + "login": "1337r0j4n", + "id": 84887432, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84887432?v=4", + "html_url": "https:\/\/github.com\/1337r0j4n" + }, + "html_url": "https:\/\/github.com\/1337r0j4n\/CVE-2023-5360", + "description": "CVE-2023-5360 Exploit\/POC", + "fork": false, + "created_at": "2023-11-13T12:51:34Z", + "updated_at": "2023-11-13T12:59:12Z", + "pushed_at": "2023-11-13T12:58:13Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "cve-2023-5360" + ], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index 26d0332a33..510b7d28bc 100644 --- a/README.md +++ b/README.md @@ -233,6 +233,7 @@ In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behaviour, Denial of Service and full system compromise. +- [Chocapikk/CVE-2023-1698](https://github.com/Chocapikk/CVE-2023-1698) - [deIndra/CVE-2023-1698](https://github.com/deIndra/CVE-2023-1698) - [thedarknessdied/WAGO-CVE-2023-1698](https://github.com/thedarknessdied/WAGO-CVE-2023-1698) @@ -573,6 +574,7 @@ - [passwa11/CVE-2023-3519](https://github.com/passwa11/CVE-2023-3519) - [rwincey/cve-2023-3519](https://github.com/rwincey/cve-2023-3519) - [mandiant/citrix-ioc-scanner-cve-2023-3519](https://github.com/mandiant/citrix-ioc-scanner-cve-2023-3519) +- [Chocapikk/CVE-2023-3519](https://github.com/Chocapikk/CVE-2023-3519) - [JonaNeidhart/CVE-2023-3519-BackdoorCheck](https://github.com/JonaNeidhart/CVE-2023-3519-BackdoorCheck) - [Aicks/Citrix-CVE-2023-3519](https://github.com/Aicks/Citrix-CVE-2023-3519) - [Mohammaddvd/CVE-2023-3519](https://github.com/Mohammaddvd/CVE-2023-3519) @@ -859,6 +861,7 @@ - [tucommenceapousser/CVE-2023-5360](https://github.com/tucommenceapousser/CVE-2023-5360) - [Jenderal92/WP-CVE-2023-5360](https://github.com/Jenderal92/WP-CVE-2023-5360) - [Pushkarup/CVE-2023-5360](https://github.com/Pushkarup/CVE-2023-5360) +- [1337r0j4n/CVE-2023-5360](https://github.com/1337r0j4n/CVE-2023-5360) ### CVE-2023-5412 (2023-10-31) @@ -1976,6 +1979,7 @@ - [nuts7/CVE-2023-27372](https://github.com/nuts7/CVE-2023-27372) +- [Chocapikk/CVE-2023-27372](https://github.com/Chocapikk/CVE-2023-27372) - [0SPwn/CVE-2023-27372-PoC](https://github.com/0SPwn/CVE-2023-27372-PoC) - [izzz0/CVE-2023-27372-POC](https://github.com/izzz0/CVE-2023-27372-POC) - [Pari-Malam/CVE-2023-27372](https://github.com/Pari-Malam/CVE-2023-27372) @@ -2124,6 +2128,7 @@ - [fortra/CVE-2023-28252](https://github.com/fortra/CVE-2023-28252) +- [Danasuley/CVE-2023-28252-](https://github.com/Danasuley/CVE-2023-28252-) ### CVE-2023-28310 (2023-06-14) @@ -2173,6 +2178,7 @@ - [CHINA-china/MinIO_CVE-2023-28432_EXP](https://github.com/CHINA-china/MinIO_CVE-2023-28432_EXP) - [TaroballzChen/CVE-2023-28432-metasploit-scanner](https://github.com/TaroballzChen/CVE-2023-28432-metasploit-scanner) - [bingtangbanli/CVE-2023-28432](https://github.com/bingtangbanli/CVE-2023-28432) +- [Chocapikk/CVE-2023-28432](https://github.com/Chocapikk/CVE-2023-28432) - [yTxZx/CVE-2023-28432](https://github.com/yTxZx/CVE-2023-28432) ### CVE-2023-28434 (2023-03-22) @@ -3032,6 +3038,7 @@ An OS Command Injection vulnerability in Parks Fiberlink 210 firmware version V2.1.14_X000 was found via the /boaform/admin/formPing target_addr parameter. +- [Chocapikk/CVE-2023-33617](https://github.com/Chocapikk/CVE-2023-33617) - [tucommenceapousser/CVE-2023-33617](https://github.com/tucommenceapousser/CVE-2023-33617) ### CVE-2023-33668 (2023-07-12) @@ -3372,6 +3379,13 @@ - [emanueldosreis/nmap-CVE-2023-35078-Exploit](https://github.com/emanueldosreis/nmap-CVE-2023-35078-Exploit) - [Blue-number/CVE-2023-35078](https://github.com/Blue-number/CVE-2023-35078) +### CVE-2023-35082 (2023-08-15) + +An authentication bypass vulnerability in Ivanti EPMM 11.10 and older, allows unauthorized users to access restricted functionality or resources of the application without proper authentication. This vulnerability is unique to CVE-2023-35078 announced earlier. + + +- [Chocapikk/CVE-2023-35082](https://github.com/Chocapikk/CVE-2023-35082) + ### CVE-2023-35086 (2023-07-21) \nIt is identified a format string vulnerability in ASUS RT-AX56U V2 & RT-AC86U. This vulnerability is caused by directly using input as a format string when calling syslog in logmessage_normal function, in the do_detwan_cgi module of httpd. An unauthenticated remote attacker without privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service.\n\nThis issue affects RT-AX56U V2: 3.0.0.4.386_50460; RT-AC86U: 3.0.0.4_386_51529.\n\n @@ -3466,6 +3480,7 @@ - [datackmy/FallingSkies-CVE-2023-35885](https://github.com/datackmy/FallingSkies-CVE-2023-35885) +- [Chocapikk/CVE-2023-35885](https://github.com/Chocapikk/CVE-2023-35885) ### CVE-2023-36076 (2023-09-01) @@ -3634,6 +3649,7 @@ A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity.\n\n\n\nWith a specific request to user.php that doesn't require authentication an attacker is able to upload arbitrary files via J-Web, leading to a loss of \n\nintegrity\n\nfor a certain \n\npart of the file system, which may allow chaining to other vulnerabilities.\n\n\nThis issue affects Juniper Networks Junos OS on SRX Series:\n\n\n\n * All versions prior to 20.4R3-S8;\n * 21.1 versions 21.1R1 and later;\n * 21.2 versions prior to 21.2R3-S6;\n * 21.3 versions \n\nprior to \n\n 21.3R3-S5;\n * 21.4 versions \n\nprior to \n\n21.4R3-S5;\n * 22.1 versions \n\nprior to \n\n22.1R3-S3;\n * 22.2 versions \n\nprior to \n\n22.2R3-S2;\n * 22.3 versions \n\nprior to \n\n22.3R2-S2, 22.3R3;\n * 22.4 versions \n\nprior to \n\n22.4R2-S1, 22.4R3.\n\n\n\n\n +- [Chocapikk/CVE-2023-36846](https://github.com/Chocapikk/CVE-2023-36846) - [Dreamy-elfland/CVE-2023-36846](https://github.com/Dreamy-elfland/CVE-2023-36846) ### CVE-2023-36874 (2023-07-11) @@ -3926,6 +3942,7 @@ - [adriyansyah-mf/CVE-2023-38646--Metabase-](https://github.com/adriyansyah-mf/CVE-2023-38646--Metabase-) - [Pumpkin-Garden/POC_Metabase_CVE-2023-38646](https://github.com/Pumpkin-Garden/POC_Metabase_CVE-2023-38646) - [0xrobiul/CVE-2023-38646](https://github.com/0xrobiul/CVE-2023-38646) +- [Chocapikk/CVE-2023-38646](https://github.com/Chocapikk/CVE-2023-38646) - [Xuxfff/CVE-2023-38646-Poc](https://github.com/Xuxfff/CVE-2023-38646-Poc) - [securezeron/CVE-2023-38646](https://github.com/securezeron/CVE-2023-38646) - [LazyySec/CVE-2023-38646](https://github.com/LazyySec/CVE-2023-38646) @@ -5087,6 +5104,13 @@ - [BaadMaro/CVE-2023-47119](https://github.com/BaadMaro/CVE-2023-47119) +### CVE-2023-47129 (2023-11-10) + +Statmic is a core Laravel content management system Composer package. Prior to versions 3.4.13 and 4.33.0, on front-end forms with an asset upload field, PHP files crafted to look like images may be uploaded. This only affects forms using the "Forms" feature and not just _any_ arbitrary form. This does not affect the control panel. This issue has been patched in 3.4.13 and 4.33.0.\n + + +- [Cyber-Wo0dy/CVE-2023-47129](https://github.com/Cyber-Wo0dy/CVE-2023-47129) + ### CVE-2023-47179 - [RandomRobbieBF/CVE-2023-47179](https://github.com/RandomRobbieBF/CVE-2023-47179) @@ -5103,6 +5127,9 @@ ### CVE-2023-47460 - [aleksey-vi/CVE-2023-47460](https://github.com/aleksey-vi/CVE-2023-47460) +### CVE-2023-47529 +- [RandomRobbieBF/CVE-2023-47529](https://github.com/RandomRobbieBF/CVE-2023-47529) + ### CVE-2023-51504 - [Sybelle03/CVE-2023-51504](https://github.com/Sybelle03/CVE-2023-51504) @@ -6800,6 +6827,7 @@ - [MLX15/CVE-2022-22954](https://github.com/MLX15/CVE-2022-22954) - [mhurts/CVE-2022-22954-POC](https://github.com/mhurts/CVE-2022-22954-POC) - [nguyenv1nK/CVE-2022-22954](https://github.com/nguyenv1nK/CVE-2022-22954) +- [Chocapikk/CVE-2022-22954](https://github.com/Chocapikk/CVE-2022-22954) - [secfb/CVE-2022-22954](https://github.com/secfb/CVE-2022-22954) - [orwagodfather/CVE-2022-22954](https://github.com/orwagodfather/CVE-2022-22954) - [b4dboy17/CVE-2022-22954](https://github.com/b4dboy17/CVE-2022-22954) @@ -7276,6 +7304,13 @@ - [comrade99/CVE-2022-24181](https://github.com/comrade99/CVE-2022-24181) +### CVE-2022-24227 (2022-02-15) + +A cross-site scripting (XSS) vulnerability in BoltWire v7.10 and v 8.00 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the name and lastname parameters. + + +- [Cyber-Wo0dy/CVE-2022-24227-updated](https://github.com/Cyber-Wo0dy/CVE-2022-24227-updated) + ### CVE-2022-24342 (2022-02-25) In JetBrains TeamCity before 2021.2.1, URL injection leading to CSRF was possible. @@ -7788,6 +7823,7 @@ - [cai-niao98/CVE-2022-26134](https://github.com/cai-niao98/CVE-2022-26134) - [sunny-kathuria/exploit_CVE-2022-26134](https://github.com/sunny-kathuria/exploit_CVE-2022-26134) - [KeepWannabe/BotCon](https://github.com/KeepWannabe/BotCon) +- [Chocapikk/CVE-2022-26134](https://github.com/Chocapikk/CVE-2022-26134) - [AmoloHT/CVE-2022-26134](https://github.com/AmoloHT/CVE-2022-26134) - [kh4sh3i/CVE-2022-26134](https://github.com/kh4sh3i/CVE-2022-26134) - [ColdFusionX/CVE-2022-26134](https://github.com/ColdFusionX/CVE-2022-26134) @@ -8091,6 +8127,7 @@ - [miko550/CVE-2022-27925](https://github.com/miko550/CVE-2022-27925) - [navokus/CVE-2022-27925](https://github.com/navokus/CVE-2022-27925) - [Josexv1/CVE-2022-27925](https://github.com/Josexv1/CVE-2022-27925) +- [Chocapikk/CVE-2022-27925-Revshell](https://github.com/Chocapikk/CVE-2022-27925-Revshell) - [akincibor/CVE-2022-27925](https://github.com/akincibor/CVE-2022-27925) - [lolminerxmrig/CVE-2022-27925-Revshell](https://github.com/lolminerxmrig/CVE-2022-27925-Revshell) - [touchmycrazyredhat/CVE-2022-27925-Revshell](https://github.com/touchmycrazyredhat/CVE-2022-27925-Revshell) @@ -8375,6 +8412,7 @@ SolarView Compact ver.6.00 was discovered to contain a command injection vulnerability via conf_mail.php. +- [Chocapikk/CVE-2022-29303](https://github.com/Chocapikk/CVE-2022-29303) - [1f3lse/CVE-2022-29303](https://github.com/1f3lse/CVE-2022-29303) ### CVE-2022-29337 (2022-05-24) @@ -8437,6 +8475,7 @@ - [axin2019/CVE-2022-29464](https://github.com/axin2019/CVE-2022-29464) - [LinJacck/CVE-2022-29464](https://github.com/LinJacck/CVE-2022-29464) - [Inplex-sys/CVE-2022-29464-loader](https://github.com/Inplex-sys/CVE-2022-29464-loader) +- [Chocapikk/CVE-2022-29464](https://github.com/Chocapikk/CVE-2022-29464) - [jimidk/Better-CVE-2022-29464](https://github.com/jimidk/Better-CVE-2022-29464) - [electr0lulz/Mass-exploit-CVE-2022-29464](https://github.com/electr0lulz/Mass-exploit-CVE-2022-29464) - [xinghonghaoyue/CVE-2022-29464](https://github.com/xinghonghaoyue/CVE-2022-29464) @@ -8786,6 +8825,7 @@ - [M4fiaB0y/CVE-2022-30525](https://github.com/M4fiaB0y/CVE-2022-30525) - [k0sf/CVE-2022-30525](https://github.com/k0sf/CVE-2022-30525) - [superzerosec/CVE-2022-30525](https://github.com/superzerosec/CVE-2022-30525) +- [Chocapikk/CVE-2022-30525-Reverse-Shell](https://github.com/Chocapikk/CVE-2022-30525-Reverse-Shell) - [160Team/CVE-2022-30525](https://github.com/160Team/CVE-2022-30525) - [zhefox/CVE-2022-30525-Reverse-Shell](https://github.com/zhefox/CVE-2022-30525-Reverse-Shell) - [iveresk/cve-2022-30525](https://github.com/iveresk/cve-2022-30525) @@ -9075,6 +9115,7 @@ - [Madliife0/CVE-2022-31814](https://github.com/Madliife0/CVE-2022-31814) - [TheUnknownSoul/CVE-2022-31814](https://github.com/TheUnknownSoul/CVE-2022-31814) - [drcayber/RCE](https://github.com/drcayber/RCE) +- [Chocapikk/CVE-2022-31814](https://github.com/Chocapikk/CVE-2022-31814) - [dkstar11q/CVE-2022-31814](https://github.com/dkstar11q/CVE-2022-31814) ### CVE-2022-31854 (2022-07-07) @@ -9664,6 +9705,7 @@ - [fed-speak/CVE-2022-36804-PoC-Exploit](https://github.com/fed-speak/CVE-2022-36804-PoC-Exploit) - [Vulnmachines/bitbucket-cve-2022-36804](https://github.com/Vulnmachines/bitbucket-cve-2022-36804) - [kljunowsky/CVE-2022-36804-POC](https://github.com/kljunowsky/CVE-2022-36804-POC) +- [Chocapikk/CVE-2022-36804-ReverseShell](https://github.com/Chocapikk/CVE-2022-36804-ReverseShell) - [khal4n1/CVE-2022-36804](https://github.com/khal4n1/CVE-2022-36804) - [vj4336/CVE-2022-36804-ReverseShell](https://github.com/vj4336/CVE-2022-36804-ReverseShell) - [tahtaciburak/cve-2022-36804](https://github.com/tahtaciburak/cve-2022-36804) @@ -9997,6 +10039,7 @@ - [horizon3ai/CVE-2022-39952](https://github.com/horizon3ai/CVE-2022-39952) - [shiyeshu/CVE-2022-39952_webshell](https://github.com/shiyeshu/CVE-2022-39952_webshell) +- [Chocapikk/CVE-2022-39952](https://github.com/Chocapikk/CVE-2022-39952) - [dkstar11q/CVE-2022-39952-better](https://github.com/dkstar11q/CVE-2022-39952-better) ### CVE-2022-39959 (2022-10-07) @@ -10131,6 +10174,7 @@ - [iveresk/CVE-2022-40684](https://github.com/iveresk/CVE-2022-40684) - [mhd108/CVE-2022-40684](https://github.com/mhd108/CVE-2022-40684) - [ClickCyber/cve-2022-40684](https://github.com/ClickCyber/cve-2022-40684) +- [Chocapikk/CVE-2022-40684](https://github.com/Chocapikk/CVE-2022-40684) - [mohamedbenchikh/CVE-2022-40684](https://github.com/mohamedbenchikh/CVE-2022-40684) - [HAWA771/CVE-2022-40684](https://github.com/HAWA771/CVE-2022-40684) - [NeriaBasha/CVE-2022-40684](https://github.com/NeriaBasha/CVE-2022-40684) @@ -10805,6 +10849,7 @@ - [numanturle/CVE-2022-44877](https://github.com/numanturle/CVE-2022-44877) - [komomon/CVE-2022-44877-RCE](https://github.com/komomon/CVE-2022-44877-RCE) - [ColdFusionX/CVE-2022-44877-CWP7](https://github.com/ColdFusionX/CVE-2022-44877-CWP7) +- [Chocapikk/CVE-2022-44877](https://github.com/Chocapikk/CVE-2022-44877) - [hotpotcookie/CVE-2022-44877-white-box](https://github.com/hotpotcookie/CVE-2022-44877-white-box) - [RicYaben/CVE-2022-44877-LAB](https://github.com/RicYaben/CVE-2022-44877-LAB) - [dkstar11q/CVE-2022-44877](https://github.com/dkstar11q/CVE-2022-44877) @@ -14990,6 +15035,13 @@ - [zer0qs/CVE-2021-35042](https://github.com/zer0qs/CVE-2021-35042) - [LUUANHDUC/CVE-2021-35042](https://github.com/LUUANHDUC/CVE-2021-35042) +### CVE-2021-35064 (2021-07-12) + +KramerAV VIAWare, all tested versions, allow privilege escalation through misconfiguration of sudo. Sudoers permits running of multiple dangerous commands, including unzip, systemctl and dpkg. + + +- [Chocapikk/CVE-2021-35064](https://github.com/Chocapikk/CVE-2021-35064) + ### CVE-2021-35211 (2021-07-14) Microsoft discovered a remote code execution (RCE) vulnerability in the SolarWinds Serv-U product utilizing a Remote Memory Escape Vulnerability. If exploited, a threat actor may be able to gain privileged access to the machine hosting Serv-U Only. SolarWinds Serv-U Managed File Transfer and Serv-U Secure FTP for Windows before 15.2.3 HF2 are affected by this vulnerability. @@ -16191,6 +16243,7 @@ - [bernardas/netsec-polygon](https://github.com/bernardas/netsec-polygon) - [CalfCrusher/Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit](https://github.com/CalfCrusher/Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit) - [vuongnv3389-sec/cve-2021-41773](https://github.com/vuongnv3389-sec/cve-2021-41773) +- [Chocapikk/CVE-2021-41773](https://github.com/Chocapikk/CVE-2021-41773) - [wangfly-me/Apache_Penetration_Tool](https://github.com/wangfly-me/Apache_Penetration_Tool) - [anldori/CVE-2021-41773-Scanner](https://github.com/anldori/CVE-2021-41773-Scanner) - [iosifache/ApacheRCEEssay](https://github.com/iosifache/ApacheRCEEssay) @@ -17736,6 +17789,7 @@ - [nobodyatall648/CVE-2021-46422](https://github.com/nobodyatall648/CVE-2021-46422) +- [Chocapikk/CVE-2021-46422](https://github.com/Chocapikk/CVE-2021-46422) - [twoning/CVE-2021-46422_PoC](https://github.com/twoning/CVE-2021-46422_PoC) - [Awei507/CVE-RCE](https://github.com/Awei507/CVE-RCE) - [yigexioabai/CVE-2021-46422_RCE](https://github.com/yigexioabai/CVE-2021-46422_RCE) @@ -26310,6 +26364,7 @@ FreeSWITCH 1.6.10 through 1.10.1 has a default password in event_socket.conf.xml. +- [Chocapikk/CVE-2019-19492](https://github.com/Chocapikk/CVE-2019-19492) - [tucommenceapousser/CVE-2019-19492](https://github.com/tucommenceapousser/CVE-2019-19492) - [tucommenceapousser/CVE-2019-19492-2](https://github.com/tucommenceapousser/CVE-2019-19492-2) @@ -37102,7 +37157,6 @@ - [websecnl/Bulk_CVE-1999-0532_Scanner](https://github.com/websecnl/Bulk_CVE-1999-0532_Scanner) -- [Rodney-O-C-Melby/dns-zone-transfer-test](https://github.com/Rodney-O-C-Melby/dns-zone-transfer-test) ### CVE-1999-1053 (2001-09-12)