diff --git a/1999/CVE-1999-0532.json b/1999/CVE-1999-0532.json
index ce6a1379cd..6134fb2882 100644
--- a/1999/CVE-1999-0532.json
+++ b/1999/CVE-1999-0532.json
@@ -28,35 +28,5 @@
"watchers": 4,
"score": 0,
"subscribers_count": 2
- },
- {
- "id": 338099634,
- "name": "dns-zone-transfer-test",
- "full_name": "Rodney-O-C-Melby\/dns-zone-transfer-test",
- "owner": {
- "login": "Rodney-O-C-Melby",
- "id": 16503898,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16503898?v=4",
- "html_url": "https:\/\/github.com\/Rodney-O-C-Melby"
- },
- "html_url": "https:\/\/github.com\/Rodney-O-C-Melby\/dns-zone-transfer-test",
- "description": "Automates Domain Name System (DNS) zone transfer testing. Checks for CVE-1999-0532 by automatically finding a given domains nameservers, and tests for zone transfers, if successful, subdomains are printed to standard output.",
- "fork": false,
- "created_at": "2021-02-11T17:25:24Z",
- "updated_at": "2023-03-27T20:49:20Z",
- "pushed_at": "2022-05-02T13:11:16Z",
- "stargazers_count": 3,
- "watchers_count": 3,
- "has_discussions": true,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 0,
- "watchers": 3,
- "score": 0,
- "subscribers_count": 3
}
]
\ No newline at end of file
diff --git a/2016/CVE-2016-5195.json b/2016/CVE-2016-5195.json
index 1b03502ded..f812365d06 100644
--- a/2016/CVE-2016-5195.json
+++ b/2016/CVE-2016-5195.json
@@ -452,7 +452,7 @@
"stargazers_count": 774,
"watchers_count": 774,
"has_discussions": false,
- "forks_count": 435,
+ "forks_count": 434,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -462,7 +462,7 @@
"exploit"
],
"visibility": "public",
- "forks": 435,
+ "forks": 434,
"watchers": 774,
"score": 0,
"subscribers_count": 11
diff --git a/2017/CVE-2017-12615.json b/2017/CVE-2017-12615.json
index 99ec5c9745..9e1ddf1545 100644
--- a/2017/CVE-2017-12615.json
+++ b/2017/CVE-2017-12615.json
@@ -343,10 +343,10 @@
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
"fork": false,
"created_at": "2022-11-13T11:01:41Z",
- "updated_at": "2023-11-10T15:24:06Z",
+ "updated_at": "2023-11-13T06:19:37Z",
"pushed_at": "2022-11-15T09:05:50Z",
- "stargazers_count": 97,
- "watchers_count": 97,
+ "stargazers_count": 98,
+ "watchers_count": 98,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@@ -355,7 +355,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
- "watchers": 97,
+ "watchers": 98,
"score": 0,
"subscribers_count": 4
},
diff --git a/2018/CVE-2018-7600.json b/2018/CVE-2018-7600.json
index afa33013bb..21819326dc 100644
--- a/2018/CVE-2018-7600.json
+++ b/2018/CVE-2018-7600.json
@@ -363,10 +363,10 @@
"description": "Exploit for Drupal 7 <= 7.57 CVE-2018-7600",
"fork": false,
"created_at": "2018-04-17T15:38:15Z",
- "updated_at": "2023-11-05T14:07:08Z",
+ "updated_at": "2023-11-13T07:41:23Z",
"pushed_at": "2018-04-26T15:40:28Z",
- "stargazers_count": 116,
- "watchers_count": 116,
+ "stargazers_count": 117,
+ "watchers_count": 117,
"has_discussions": false,
"forks_count": 66,
"allow_forking": true,
@@ -375,7 +375,7 @@
"topics": [],
"visibility": "public",
"forks": 66,
- "watchers": 116,
+ "watchers": 117,
"score": 0,
"subscribers_count": 5
},
diff --git a/2018/CVE-2018-8440.json b/2018/CVE-2018-8440.json
index 417f3aca37..59c875459e 100644
--- a/2018/CVE-2018-8440.json
+++ b/2018/CVE-2018-8440.json
@@ -13,10 +13,10 @@
"description": "CVE-2018-8440 standalone exploit",
"fork": false,
"created_at": "2018-10-31T17:00:43Z",
- "updated_at": "2023-10-19T06:40:46Z",
+ "updated_at": "2023-11-13T06:19:45Z",
"pushed_at": "2018-10-31T19:05:17Z",
- "stargazers_count": 80,
- "watchers_count": 80,
+ "stargazers_count": 81,
+ "watchers_count": 81,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 27,
- "watchers": 80,
+ "watchers": 81,
"score": 0,
"subscribers_count": 6
}
diff --git a/2019/CVE-2019-19492.json b/2019/CVE-2019-19492.json
index 5cdc2a682a..f650720fd5 100644
--- a/2019/CVE-2019-19492.json
+++ b/2019/CVE-2019-19492.json
@@ -1,4 +1,34 @@
[
+ {
+ "id": 644570191,
+ "name": "CVE-2019-19492",
+ "full_name": "Chocapikk\/CVE-2019-19492",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2019-19492",
+ "description": "FreeSWITCH Exploit (CVE-2019-19492)",
+ "fork": false,
+ "created_at": "2023-05-23T19:53:54Z",
+ "updated_at": "2023-11-13T09:05:52Z",
+ "pushed_at": "2023-05-25T18:48:34Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
{
"id": 644577238,
"name": "CVE-2019-19492",
diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json
index 619ac201a4..088a1747ab 100644
--- a/2020/CVE-2020-1472.json
+++ b/2020/CVE-2020-1472.json
@@ -108,13 +108,13 @@
"stargazers_count": 1095,
"watchers_count": 1095,
"has_discussions": false,
- "forks_count": 284,
+ "forks_count": 285,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 284,
+ "forks": 285,
"watchers": 1095,
"score": 0,
"subscribers_count": 35
@@ -170,10 +170,10 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
- "updated_at": "2023-11-10T07:02:32Z",
+ "updated_at": "2023-11-13T08:52:43Z",
"pushed_at": "2020-10-15T18:31:15Z",
- "stargazers_count": 560,
- "watchers_count": 560,
+ "stargazers_count": 561,
+ "watchers_count": 561,
"has_discussions": false,
"forks_count": 144,
"allow_forking": true,
@@ -182,7 +182,7 @@
"topics": [],
"visibility": "public",
"forks": 144,
- "watchers": 560,
+ "watchers": 561,
"score": 0,
"subscribers_count": 14
},
diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json
index 38635bf87b..b9ac4fe28b 100644
--- a/2021/CVE-2021-21972.json
+++ b/2021/CVE-2021-21972.json
@@ -851,10 +851,10 @@
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
- "updated_at": "2023-11-13T03:19:59Z",
+ "updated_at": "2023-11-13T08:56:00Z",
"pushed_at": "2023-10-10T05:38:02Z",
- "stargazers_count": 1153,
- "watchers_count": 1153,
+ "stargazers_count": 1155,
+ "watchers_count": 1155,
"has_discussions": false,
"forks_count": 149,
"allow_forking": true,
@@ -870,7 +870,7 @@
],
"visibility": "public",
"forks": 149,
- "watchers": 1153,
+ "watchers": 1155,
"score": 0,
"subscribers_count": 11
}
diff --git a/2021/CVE-2021-24155.json b/2021/CVE-2021-24155.json
index 397c58cc62..ef965393a4 100644
--- a/2021/CVE-2021-24155.json
+++ b/2021/CVE-2021-24155.json
@@ -13,10 +13,10 @@
"description": "WordPress Backup Guard Authenticated Remote Code Execution Exploit",
"fork": false,
"created_at": "2021-07-30T11:28:53Z",
- "updated_at": "2023-09-28T11:29:59Z",
+ "updated_at": "2023-11-13T10:10:35Z",
"pushed_at": "2021-07-30T11:35:54Z",
- "stargazers_count": 11,
- "watchers_count": 11,
+ "stargazers_count": 12,
+ "watchers_count": 12,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
- "watchers": 11,
+ "watchers": 12,
"score": 0,
"subscribers_count": 1
}
diff --git a/2021/CVE-2021-35064.json b/2021/CVE-2021-35064.json
new file mode 100644
index 0000000000..8aa00b8a69
--- /dev/null
+++ b/2021/CVE-2021-35064.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 498962746,
+ "name": "CVE-2021-35064",
+ "full_name": "Chocapikk\/CVE-2021-35064",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2021-35064",
+ "description": "Python script to exploit CVE-2021-35064 and CVE-2021-36356",
+ "fork": false,
+ "created_at": "2022-06-02T02:19:49Z",
+ "updated_at": "2023-11-13T09:10:54Z",
+ "pushed_at": "2022-06-02T17:29:36Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3560.json b/2021/CVE-2021-3560.json
index 4a8ef56af9..ca2dcf9df8 100644
--- a/2021/CVE-2021-3560.json
+++ b/2021/CVE-2021-3560.json
@@ -322,10 +322,10 @@
"description": "Polkit D-Bus Authentication Bypass Exploit",
"fork": false,
"created_at": "2021-07-30T11:41:34Z",
- "updated_at": "2023-09-28T11:29:59Z",
+ "updated_at": "2023-11-13T10:10:36Z",
"pushed_at": "2021-07-30T11:43:32Z",
- "stargazers_count": 10,
- "watchers_count": 10,
+ "stargazers_count": 11,
+ "watchers_count": 11,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@@ -334,7 +334,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
- "watchers": 10,
+ "watchers": 11,
"score": 0,
"subscribers_count": 1
},
diff --git a/2021/CVE-2021-36934.json b/2021/CVE-2021-36934.json
index 149552a8be..60ab67087e 100644
--- a/2021/CVE-2021-36934.json
+++ b/2021/CVE-2021-36934.json
@@ -13,10 +13,10 @@
"description": "Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation",
"fork": false,
"created_at": "2021-07-20T22:16:49Z",
- "updated_at": "2023-11-02T09:30:01Z",
+ "updated_at": "2023-11-13T10:13:46Z",
"pushed_at": "2022-01-16T02:09:46Z",
- "stargazers_count": 198,
- "watchers_count": 198,
+ "stargazers_count": 199,
+ "watchers_count": 199,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 37,
- "watchers": 198,
+ "watchers": 199,
"score": 0,
"subscribers_count": 5
},
diff --git a/2021/CVE-2021-38699.json b/2021/CVE-2021-38699.json
index 10f1aec196..65f8b2c1d2 100644
--- a/2021/CVE-2021-38699.json
+++ b/2021/CVE-2021-38699.json
@@ -13,10 +13,10 @@
"description": "Multiple Reflected XSS in TastyIgniter v3.0.7 Restaurtant CMS",
"fork": false,
"created_at": "2021-08-12T21:12:04Z",
- "updated_at": "2023-10-10T13:10:08Z",
+ "updated_at": "2023-11-13T10:18:58Z",
"pushed_at": "2021-08-17T01:24:12Z",
- "stargazers_count": 4,
- "watchers_count": 4,
+ "stargazers_count": 5,
+ "watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 4,
+ "watchers": 5,
"score": 0,
"subscribers_count": 1
},
@@ -43,10 +43,10 @@
"description": "Stored XSS in TastyIgniter v3.0.7 Restaurtant CMS",
"fork": false,
"created_at": "2021-08-12T22:32:18Z",
- "updated_at": "2023-10-10T13:10:12Z",
+ "updated_at": "2023-11-13T10:18:48Z",
"pushed_at": "2021-08-15T23:33:36Z",
- "stargazers_count": 2,
- "watchers_count": 2,
+ "stargazers_count": 3,
+ "watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 2,
+ "watchers": 3,
"score": 0,
"subscribers_count": 1
},
diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json
index 04bb0dc443..9032b1364d 100644
--- a/2021/CVE-2021-41773.json
+++ b/2021/CVE-2021-41773.json
@@ -2727,6 +2727,36 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 480821526,
+ "name": "CVE-2021-41773",
+ "full_name": "Chocapikk\/CVE-2021-41773",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2021-41773",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-12T13:25:58Z",
+ "updated_at": "2023-11-13T09:12:47Z",
+ "pushed_at": "2022-04-12T13:26:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 486245191,
"name": "Apache_Penetration_Tool",
diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json
index d68cca307f..47270afb0c 100644
--- a/2021/CVE-2021-44228.json
+++ b/2021/CVE-2021-44228.json
@@ -2489,10 +2489,10 @@
"description": "Abuse Log4J CVE-2021-44228 to patch CVE-2021-44228 in vulnerable Minecraft game sessions to prevent exploitation in the session :) ",
"fork": false,
"created_at": "2021-12-12T11:26:42Z",
- "updated_at": "2023-09-24T13:17:31Z",
+ "updated_at": "2023-11-13T10:10:32Z",
"pushed_at": "2021-12-12T17:37:11Z",
- "stargazers_count": 65,
- "watchers_count": 65,
+ "stargazers_count": 66,
+ "watchers_count": 66,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@@ -2509,7 +2509,7 @@
],
"visibility": "public",
"forks": 4,
- "watchers": 65,
+ "watchers": 66,
"score": 0,
"subscribers_count": 1
},
diff --git a/2021/CVE-2021-46422.json b/2021/CVE-2021-46422.json
index 4ae771f379..44d93eb306 100644
--- a/2021/CVE-2021-46422.json
+++ b/2021/CVE-2021-46422.json
@@ -29,6 +29,36 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 505571322,
+ "name": "CVE-2021-46422",
+ "full_name": "Chocapikk\/CVE-2021-46422",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2021-46422",
+ "description": "Telesquare SDT-CW3B1 1.1.0 - OS Command Injection",
+ "fork": false,
+ "created_at": "2022-06-20T19:24:55Z",
+ "updated_at": "2023-11-13T09:09:09Z",
+ "pushed_at": "2022-10-16T15:20:49Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 513717270,
"name": "CVE-2021-46422_PoC",
diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json
index fa4fc09a50..d0cf54c56a 100644
--- a/2022/CVE-2022-0847.json
+++ b/2022/CVE-2022-0847.json
@@ -1185,10 +1185,10 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
- "updated_at": "2023-11-12T07:00:08Z",
+ "updated_at": "2023-11-13T11:07:52Z",
"pushed_at": "2023-05-20T05:55:45Z",
- "stargazers_count": 468,
- "watchers_count": 468,
+ "stargazers_count": 470,
+ "watchers_count": 470,
"has_discussions": false,
"forks_count": 132,
"allow_forking": true,
@@ -1197,7 +1197,7 @@
"topics": [],
"visibility": "public",
"forks": 132,
- "watchers": 468,
+ "watchers": 470,
"score": 0,
"subscribers_count": 15
},
diff --git a/2022/CVE-2022-1015.json b/2022/CVE-2022-1015.json
index eff2879ae9..8cb7793cd2 100644
--- a/2022/CVE-2022-1015.json
+++ b/2022/CVE-2022-1015.json
@@ -18,13 +18,13 @@
"stargazers_count": 187,
"watchers_count": 187,
"has_discussions": false,
- "forks_count": 35,
+ "forks_count": 36,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 35,
+ "forks": 36,
"watchers": 187,
"score": 0,
"subscribers_count": 7
diff --git a/2022/CVE-2022-20421.json b/2022/CVE-2022-20421.json
index 82e59b8203..cc9360510a 100644
--- a/2022/CVE-2022-20421.json
+++ b/2022/CVE-2022-20421.json
@@ -13,10 +13,10 @@
"description": "Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)",
"fork": false,
"created_at": "2023-03-23T10:25:59Z",
- "updated_at": "2023-11-11T19:40:42Z",
+ "updated_at": "2023-11-13T07:27:42Z",
"pushed_at": "2023-05-27T15:39:41Z",
- "stargazers_count": 198,
- "watchers_count": 198,
+ "stargazers_count": 199,
+ "watchers_count": 199,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
- "watchers": 198,
+ "watchers": 199,
"score": 0,
"subscribers_count": 7
}
diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json
index 818885dbe1..b51507576b 100644
--- a/2022/CVE-2022-22954.json
+++ b/2022/CVE-2022-22954.json
@@ -542,6 +542,36 @@
"score": 0,
"subscribers_count": 2
},
+ {
+ "id": 498873517,
+ "name": "CVE-2022-22954",
+ "full_name": "Chocapikk\/CVE-2022-22954",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-22954",
+ "description": "Python script to exploit CVE-2022-22954 and then exploit CVE-2022-22960",
+ "fork": false,
+ "created_at": "2022-06-01T19:33:32Z",
+ "updated_at": "2023-11-13T09:12:28Z",
+ "pushed_at": "2022-06-01T23:50:18Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 498898344,
"name": "CVE-2022-22954",
@@ -766,10 +796,10 @@
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
- "updated_at": "2023-11-13T03:19:59Z",
+ "updated_at": "2023-11-13T08:56:00Z",
"pushed_at": "2023-10-10T05:38:02Z",
- "stargazers_count": 1153,
- "watchers_count": 1153,
+ "stargazers_count": 1155,
+ "watchers_count": 1155,
"has_discussions": false,
"forks_count": 149,
"allow_forking": true,
@@ -785,7 +815,7 @@
],
"visibility": "public",
"forks": 149,
- "watchers": 1153,
+ "watchers": 1155,
"score": 0,
"subscribers_count": 11
},
diff --git a/2022/CVE-2022-23808.json b/2022/CVE-2022-23808.json
index 7044ffbc8f..e0928a08b5 100644
--- a/2022/CVE-2022-23808.json
+++ b/2022/CVE-2022-23808.json
@@ -13,10 +13,10 @@
"description": "phpMyAdmin XSS ",
"fork": false,
"created_at": "2022-02-01T17:02:03Z",
- "updated_at": "2023-09-28T11:35:32Z",
+ "updated_at": "2023-11-13T10:32:41Z",
"pushed_at": "2022-02-03T16:21:01Z",
- "stargazers_count": 110,
- "watchers_count": 110,
+ "stargazers_count": 109,
+ "watchers_count": 109,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@@ -43,7 +43,7 @@
],
"visibility": "public",
"forks": 24,
- "watchers": 110,
+ "watchers": 109,
"score": 0,
"subscribers_count": 3
}
diff --git a/2022/CVE-2022-24227.json b/2022/CVE-2022-24227.json
new file mode 100644
index 0000000000..818479a1f1
--- /dev/null
+++ b/2022/CVE-2022-24227.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 718130267,
+ "name": "CVE-2022-24227-updated",
+ "full_name": "Cyber-Wo0dy\/CVE-2022-24227-updated",
+ "owner": {
+ "login": "Cyber-Wo0dy",
+ "id": 148460873,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148460873?v=4",
+ "html_url": "https:\/\/github.com\/Cyber-Wo0dy"
+ },
+ "html_url": "https:\/\/github.com\/Cyber-Wo0dy\/CVE-2022-24227-updated",
+ "description": "CVE-2022-24227 [Updated]: BoltWire v8.00 vulnerable to \"Stored Cross-site Scripting (XSS)\"",
+ "fork": false,
+ "created_at": "2023-11-13T12:53:56Z",
+ "updated_at": "2023-11-13T12:56:26Z",
+ "pushed_at": "2023-11-13T12:54:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-2588.json b/2022/CVE-2022-2588.json
index 0cfe955bfa..f4f4a4fcb0 100644
--- a/2022/CVE-2022-2588.json
+++ b/2022/CVE-2022-2588.json
@@ -133,10 +133,10 @@
"description": "A PoC for CVE-2022-2588 that triggers a WARNING",
"fork": false,
"created_at": "2022-09-18T21:35:19Z",
- "updated_at": "2023-09-28T11:42:50Z",
+ "updated_at": "2023-11-13T07:45:26Z",
"pushed_at": "2022-09-28T22:33:17Z",
- "stargazers_count": 10,
- "watchers_count": 10,
+ "stargazers_count": 11,
+ "watchers_count": 11,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
- "watchers": 10,
+ "watchers": 11,
"score": 0,
"subscribers_count": 2
},
diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json
index a03b5c3b9f..28e963cebd 100644
--- a/2022/CVE-2022-26134.json
+++ b/2022/CVE-2022-26134.json
@@ -1021,6 +1021,36 @@
"score": 0,
"subscribers_count": 2
},
+ {
+ "id": 503139905,
+ "name": "CVE-2022-26134",
+ "full_name": "Chocapikk\/CVE-2022-26134",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-26134",
+ "description": "CVE-2022-26134 - Pre-Auth Remote Code Execution via OGNL Injection",
+ "fork": false,
+ "created_at": "2022-06-13T23:01:39Z",
+ "updated_at": "2023-11-13T09:08:06Z",
+ "pushed_at": "2022-10-19T16:27:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 505123172,
"name": "CVE-2022-26134",
diff --git a/2022/CVE-2022-27925.json b/2022/CVE-2022-27925.json
index 89704cb0a2..d86c431632 100644
--- a/2022/CVE-2022-27925.json
+++ b/2022/CVE-2022-27925.json
@@ -160,6 +160,36 @@
"score": 0,
"subscribers_count": 2
},
+ {
+ "id": 529394141,
+ "name": "CVE-2022-27925-Revshell",
+ "full_name": "Chocapikk\/CVE-2022-27925-Revshell",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-27925-Revshell",
+ "description": "Python Script to exploit Zimbra Auth Bypass + RCE (CVE-2022-27925)",
+ "fork": false,
+ "created_at": "2022-08-26T20:19:48Z",
+ "updated_at": "2023-11-13T09:10:29Z",
+ "pushed_at": "2022-09-17T16:56:10Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
{
"id": 535575434,
"name": "CVE-2022-27925",
diff --git a/2022/CVE-2022-29303.json b/2022/CVE-2022-29303.json
index 4b22fa1bd9..48c2acc542 100644
--- a/2022/CVE-2022-29303.json
+++ b/2022/CVE-2022-29303.json
@@ -1,4 +1,34 @@
[
+ {
+ "id": 498521480,
+ "name": "CVE-2022-29303",
+ "full_name": "Chocapikk\/CVE-2022-29303",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-29303",
+ "description": "Python script to exploit CVE-2022-29303 ",
+ "fork": false,
+ "created_at": "2022-05-31T22:55:05Z",
+ "updated_at": "2023-11-13T09:11:39Z",
+ "pushed_at": "2022-05-31T23:10:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 498647437,
"name": "CVE-2022-29303",
diff --git a/2022/CVE-2022-29464.json b/2022/CVE-2022-29464.json
index 1ffdbf3ccf..f835459ac8 100644
--- a/2022/CVE-2022-29464.json
+++ b/2022/CVE-2022-29464.json
@@ -441,6 +441,36 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 496760787,
+ "name": "CVE-2022-29464",
+ "full_name": "Chocapikk\/CVE-2022-29464",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-29464",
+ "description": "Python script to exploit CVE-2022-29464 (mass mode)",
+ "fork": false,
+ "created_at": "2022-05-26T20:19:53Z",
+ "updated_at": "2023-11-13T09:12:01Z",
+ "pushed_at": "2022-06-01T03:29:40Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 499883723,
"name": "Better-CVE-2022-29464",
diff --git a/2022/CVE-2022-30525.json b/2022/CVE-2022-30525.json
index 2ded78bc00..dfe3627398 100644
--- a/2022/CVE-2022-30525.json
+++ b/2022/CVE-2022-30525.json
@@ -214,6 +214,36 @@
"score": 0,
"subscribers_count": 2
},
+ {
+ "id": 493718813,
+ "name": "CVE-2022-30525-Reverse-Shell",
+ "full_name": "Chocapikk\/CVE-2022-30525-Reverse-Shell",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-30525-Reverse-Shell",
+ "description": "Simple python script to exploit CVE-2022-30525 (FIXED): Zyxel Firewall Unauthenticated Remote Command Injection",
+ "fork": false,
+ "created_at": "2022-05-18T15:22:17Z",
+ "updated_at": "2023-11-13T09:11:12Z",
+ "pushed_at": "2022-05-19T11:29:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 494055901,
"name": "CVE-2022-30525",
diff --git a/2022/CVE-2022-31814.json b/2022/CVE-2022-31814.json
index a4452a9e2c..addc54332e 100644
--- a/2022/CVE-2022-31814.json
+++ b/2022/CVE-2022-31814.json
@@ -134,6 +134,36 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 618996369,
+ "name": "CVE-2022-31814",
+ "full_name": "Chocapikk\/CVE-2022-31814",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-31814",
+ "description": "pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)",
+ "fork": false,
+ "created_at": "2023-03-26T00:18:04Z",
+ "updated_at": "2023-11-13T09:06:37Z",
+ "pushed_at": "2023-03-26T00:25:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 619242757,
"name": "CVE-2022-31814",
diff --git a/2022/CVE-2022-36804.json b/2022/CVE-2022-36804.json
index aa8c80cdb5..dacd53de63 100644
--- a/2022/CVE-2022-36804.json
+++ b/2022/CVE-2022-36804.json
@@ -194,6 +194,36 @@
"score": 0,
"subscribers_count": 2
},
+ {
+ "id": 540400573,
+ "name": "CVE-2022-36804-ReverseShell",
+ "full_name": "Chocapikk\/CVE-2022-36804-ReverseShell",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-36804-ReverseShell",
+ "description": "PoC exploit for CVE-2022-36804 (BitBucket Critical Command Injection)",
+ "fork": false,
+ "created_at": "2022-09-23T11:05:22Z",
+ "updated_at": "2023-11-13T09:09:34Z",
+ "pushed_at": "2022-09-24T15:19:38Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 540713828,
"name": "CVE-2022-36804",
diff --git a/2022/CVE-2022-39952.json b/2022/CVE-2022-39952.json
index e39ee8c30b..844d58df3a 100644
--- a/2022/CVE-2022-39952.json
+++ b/2022/CVE-2022-39952.json
@@ -59,6 +59,36 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 606840385,
+ "name": "CVE-2022-39952",
+ "full_name": "Chocapikk\/CVE-2022-39952",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-39952",
+ "description": "PoC for CVE-2022-39952 affecting Fortinet FortiNAC.",
+ "fork": false,
+ "created_at": "2023-02-26T18:10:04Z",
+ "updated_at": "2023-11-13T09:07:00Z",
+ "pushed_at": "2023-02-26T18:13:50Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
{
"id": 619925116,
"name": "CVE-2022-39952-better",
diff --git a/2022/CVE-2022-40684.json b/2022/CVE-2022-40684.json
index 774081344f..5d4bcce3fa 100644
--- a/2022/CVE-2022-40684.json
+++ b/2022/CVE-2022-40684.json
@@ -249,6 +249,36 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 552028942,
+ "name": "CVE-2022-40684",
+ "full_name": "Chocapikk\/CVE-2022-40684",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-40684",
+ "description": "Fortinet Critical Authentication Bypass Vulnerability (CVE-2022-40684) [ Mass Exploit ]",
+ "fork": false,
+ "created_at": "2022-10-15T16:51:25Z",
+ "updated_at": "2023-11-13T09:08:42Z",
+ "pushed_at": "2022-10-19T16:27:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 552033176,
"name": "CVE-2022-40684",
diff --git a/2022/CVE-2022-44268.json b/2022/CVE-2022-44268.json
index 2651342640..77660215b3 100644
--- a/2022/CVE-2022-44268.json
+++ b/2022/CVE-2022-44268.json
@@ -13,10 +13,10 @@
"description": "CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator",
"fork": false,
"created_at": "2023-02-02T15:34:28Z",
- "updated_at": "2023-11-03T07:36:31Z",
+ "updated_at": "2023-11-13T07:30:55Z",
"pushed_at": "2023-02-02T16:53:37Z",
- "stargazers_count": 262,
- "watchers_count": 262,
+ "stargazers_count": 263,
+ "watchers_count": 263,
"has_discussions": false,
"forks_count": 42,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 42,
- "watchers": 262,
+ "watchers": 263,
"score": 0,
"subscribers_count": 3
},
diff --git a/2022/CVE-2022-44877.json b/2022/CVE-2022-44877.json
index 10755d857a..259b3d822f 100644
--- a/2022/CVE-2022-44877.json
+++ b/2022/CVE-2022-44877.json
@@ -89,6 +89,36 @@
"score": 0,
"subscribers_count": 2
},
+ {
+ "id": 600549630,
+ "name": "CVE-2022-44877",
+ "full_name": "Chocapikk\/CVE-2022-44877",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-44877",
+ "description": "Bash Script for Checking Command Injection Vulnerability on CentOS Web Panel [CWP] (CVE-2022-44877)",
+ "fork": false,
+ "created_at": "2023-02-11T20:45:08Z",
+ "updated_at": "2023-11-13T09:07:19Z",
+ "pushed_at": "2023-02-11T22:03:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 602139288,
"name": "CVE-2022-44877-white-box",
diff --git a/2023/CVE-2023-1698.json b/2023/CVE-2023-1698.json
index 248e5c1d01..b9cf669350 100644
--- a/2023/CVE-2023-1698.json
+++ b/2023/CVE-2023-1698.json
@@ -1,4 +1,34 @@
[
+ {
+ "id": 692207494,
+ "name": "CVE-2023-1698",
+ "full_name": "Chocapikk\/CVE-2023-1698",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-1698",
+ "description": "WAGO Remote Exploit Tool for CVE-2023-1698",
+ "fork": false,
+ "created_at": "2023-09-15T20:06:31Z",
+ "updated_at": "2023-11-13T09:02:08Z",
+ "pushed_at": "2023-09-15T20:07:07Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
{
"id": 707534264,
"name": "CVE-2023-1698",
diff --git a/2023/CVE-2023-20209.json b/2023/CVE-2023-20209.json
index 9c0ae6d137..cd09078fe2 100644
--- a/2023/CVE-2023-20209.json
+++ b/2023/CVE-2023-20209.json
@@ -18,13 +18,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
+ "forks": 4,
"watchers": 0,
"score": 0,
"subscribers_count": 0
diff --git a/2023/CVE-2023-21707.json b/2023/CVE-2023-21707.json
index 65440df7b3..44dd6ec525 100644
--- a/2023/CVE-2023-21707.json
+++ b/2023/CVE-2023-21707.json
@@ -13,10 +13,10 @@
"description": "CVE-2023-21707 EXP",
"fork": false,
"created_at": "2023-06-30T10:15:07Z",
- "updated_at": "2023-11-10T08:48:47Z",
+ "updated_at": "2023-11-13T12:17:24Z",
"pushed_at": "2023-07-06T07:43:24Z",
- "stargazers_count": 20,
- "watchers_count": 20,
+ "stargazers_count": 21,
+ "watchers_count": 21,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
- "watchers": 20,
+ "watchers": 21,
"score": 0,
"subscribers_count": 3
}
diff --git a/2023/CVE-2023-21839.json b/2023/CVE-2023-21839.json
index ae2f75b9bd..16b2a91e91 100644
--- a/2023/CVE-2023-21839.json
+++ b/2023/CVE-2023-21839.json
@@ -43,7 +43,7 @@
"description": "Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)",
"fork": false,
"created_at": "2023-02-24T13:54:42Z",
- "updated_at": "2023-10-27T14:57:30Z",
+ "updated_at": "2023-11-13T07:24:11Z",
"pushed_at": "2023-02-24T13:29:38Z",
"stargazers_count": 2,
"watchers_count": 2,
diff --git a/2023/CVE-2023-22515.json b/2023/CVE-2023-22515.json
index 97e70edd05..090b51d3a0 100644
--- a/2023/CVE-2023-22515.json
+++ b/2023/CVE-2023-22515.json
@@ -112,10 +112,10 @@
"description": "Confluence未授权添加管理员用户(CVE-2023-22515)漏洞利用工具",
"fork": false,
"created_at": "2023-10-11T08:42:17Z",
- "updated_at": "2023-11-11T14:58:24Z",
+ "updated_at": "2023-11-13T12:37:27Z",
"pushed_at": "2023-10-16T02:24:02Z",
- "stargazers_count": 77,
- "watchers_count": 77,
+ "stargazers_count": 80,
+ "watchers_count": 80,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@@ -124,7 +124,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
- "watchers": 77,
+ "watchers": 80,
"score": 0,
"subscribers_count": 3
},
@@ -309,13 +309,13 @@
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
- "forks_count": 2,
+ "forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 2,
+ "forks": 3,
"watchers": 13,
"score": 0,
"subscribers_count": 1
diff --git a/2023/CVE-2023-22518.json b/2023/CVE-2023-22518.json
index 29fc0e71ba..95ae6f6779 100644
--- a/2023/CVE-2023-22518.json
+++ b/2023/CVE-2023-22518.json
@@ -103,10 +103,10 @@
"description": "Exploit CVE-2023-22518",
"fork": false,
"created_at": "2023-11-09T06:56:18Z",
- "updated_at": "2023-11-09T07:54:32Z",
+ "updated_at": "2023-11-13T10:48:36Z",
"pushed_at": "2023-11-09T07:42:04Z",
- "stargazers_count": 1,
- "watchers_count": 1,
+ "stargazers_count": 2,
+ "watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -120,7 +120,7 @@
],
"visibility": "public",
"forks": 1,
- "watchers": 1,
+ "watchers": 2,
"score": 0,
"subscribers_count": 1
},
diff --git a/2023/CVE-2023-27363.json b/2023/CVE-2023-27363.json
index dfffa9349d..364c115bb6 100644
--- a/2023/CVE-2023-27363.json
+++ b/2023/CVE-2023-27363.json
@@ -43,10 +43,10 @@
"description": "福昕Foxit PDF远程代码执行漏洞CVE-2023-27363分析与复现",
"fork": false,
"created_at": "2023-06-14T01:18:09Z",
- "updated_at": "2023-06-16T01:30:41Z",
+ "updated_at": "2023-11-13T09:01:36Z",
"pushed_at": "2023-07-06T06:34:50Z",
- "stargazers_count": 8,
- "watchers_count": 8,
+ "stargazers_count": 9,
+ "watchers_count": 9,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
- "watchers": 8,
+ "watchers": 9,
"score": 0,
"subscribers_count": 3
},
diff --git a/2023/CVE-2023-27372.json b/2023/CVE-2023-27372.json
index 06209e3bba..9b7f67c330 100644
--- a/2023/CVE-2023-27372.json
+++ b/2023/CVE-2023-27372.json
@@ -44,6 +44,36 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 658452469,
+ "name": "CVE-2023-27372",
+ "full_name": "Chocapikk\/CVE-2023-27372",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-27372",
+ "description": "SPIP Vulnerability Scanner - CVE-2023-27372 Detector",
+ "fork": false,
+ "created_at": "2023-06-25T19:30:08Z",
+ "updated_at": "2023-11-13T09:01:41Z",
+ "pushed_at": "2023-09-16T23:13:58Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 662629965,
"name": "CVE-2023-27372-PoC",
diff --git a/2023/CVE-2023-28229.json b/2023/CVE-2023-28229.json
index c6d81fcfed..089a3a1d80 100644
--- a/2023/CVE-2023-28229.json
+++ b/2023/CVE-2023-28229.json
@@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-09-04T07:48:13Z",
- "updated_at": "2023-10-16T08:02:30Z",
+ "updated_at": "2023-11-13T09:07:44Z",
"pushed_at": "2023-09-04T07:51:58Z",
- "stargazers_count": 106,
- "watchers_count": 106,
+ "stargazers_count": 107,
+ "watchers_count": 107,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 28,
- "watchers": 106,
+ "watchers": 107,
"score": 0,
"subscribers_count": 2
}
diff --git a/2023/CVE-2023-28252.json b/2023/CVE-2023-28252.json
index 1b49d99bb2..185eb9af43 100644
--- a/2023/CVE-2023-28252.json
+++ b/2023/CVE-2023-28252.json
@@ -28,5 +28,35 @@
"watchers": 147,
"score": 0,
"subscribers_count": 2
+ },
+ {
+ "id": 718019226,
+ "name": "CVE-2023-28252-",
+ "full_name": "Danasuley\/CVE-2023-28252-",
+ "owner": {
+ "login": "Danasuley",
+ "id": 148750257,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148750257?v=4",
+ "html_url": "https:\/\/github.com\/Danasuley"
+ },
+ "html_url": "https:\/\/github.com\/Danasuley\/CVE-2023-28252-",
+ "description": "Обнаружение эксплойта CVE-2023-28252 ",
+ "fork": false,
+ "created_at": "2023-11-13T07:46:38Z",
+ "updated_at": "2023-11-13T07:46:39Z",
+ "pushed_at": "2023-11-13T07:55:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2023/CVE-2023-28432.json b/2023/CVE-2023-28432.json
index 0757019fa5..187e0cdb09 100644
--- a/2023/CVE-2023-28432.json
+++ b/2023/CVE-2023-28432.json
@@ -392,6 +392,36 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 687511506,
+ "name": "CVE-2023-28432",
+ "full_name": "Chocapikk\/CVE-2023-28432",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-28432",
+ "description": "Automated vulnerability scanner for CVE-2023-28432 in Minio deployments, revealing sensitive environment variables.",
+ "fork": false,
+ "created_at": "2023-09-05T14:01:53Z",
+ "updated_at": "2023-11-13T09:02:41Z",
+ "pushed_at": "2023-09-05T14:02:34Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
{
"id": 707634565,
"name": "CVE-2023-28432",
diff --git a/2023/CVE-2023-32629.json b/2023/CVE-2023-32629.json
index ba2c66ddde..a387a6094b 100644
--- a/2023/CVE-2023-32629.json
+++ b/2023/CVE-2023-32629.json
@@ -43,10 +43,10 @@
"description": "Ubuntu Privilege Escalation bash one-liner using CVE-2023-32629 & CVE-2023-2640",
"fork": false,
"created_at": "2023-11-09T09:19:23Z",
- "updated_at": "2023-11-12T00:26:06Z",
+ "updated_at": "2023-11-13T12:12:09Z",
"pushed_at": "2023-11-09T09:21:12Z",
- "stargazers_count": 26,
- "watchers_count": 26,
+ "stargazers_count": 27,
+ "watchers_count": 27,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
- "watchers": 26,
+ "watchers": 27,
"score": 0,
"subscribers_count": 2
},
diff --git a/2023/CVE-2023-33617.json b/2023/CVE-2023-33617.json
index 7b9f48f82f..59707e65c8 100644
--- a/2023/CVE-2023-33617.json
+++ b/2023/CVE-2023-33617.json
@@ -1,4 +1,34 @@
[
+ {
+ "id": 645969054,
+ "name": "CVE-2023-33617",
+ "full_name": "Chocapikk\/CVE-2023-33617",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-33617",
+ "description": "Authenticated OS command injection vulnerability (CVE-2023-33617)",
+ "fork": false,
+ "created_at": "2023-05-26T22:16:00Z",
+ "updated_at": "2023-11-13T09:05:24Z",
+ "pushed_at": "2023-05-26T22:29:12Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
{
"id": 645969733,
"name": "CVE-2023-33617",
diff --git a/2023/CVE-2023-34050.json b/2023/CVE-2023-34050.json
index 2d4fedbf50..7068825440 100644
--- a/2023/CVE-2023-34050.json
+++ b/2023/CVE-2023-34050.json
@@ -18,13 +18,13 @@
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
+ "forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 2
diff --git a/2023/CVE-2023-34362.json b/2023/CVE-2023-34362.json
index 4f09fd4d47..9e76b0d513 100644
--- a/2023/CVE-2023-34362.json
+++ b/2023/CVE-2023-34362.json
@@ -48,13 +48,13 @@
"stargazers_count": 129,
"watchers_count": 129,
"has_discussions": false,
- "forks_count": 32,
+ "forks_count": 33,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 32,
+ "forks": 33,
"watchers": 129,
"score": 0,
"subscribers_count": 5
diff --git a/2023/CVE-2023-35082.json b/2023/CVE-2023-35082.json
new file mode 100644
index 0000000000..b5476ed9e2
--- /dev/null
+++ b/2023/CVE-2023-35082.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 674733856,
+ "name": "CVE-2023-35082",
+ "full_name": "Chocapikk\/CVE-2023-35082",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-35082",
+ "description": "Remote Unauthenticated API Access Vulnerability in MobileIron Core 11.2 and older",
+ "fork": false,
+ "created_at": "2023-08-04T16:25:24Z",
+ "updated_at": "2023-11-13T09:04:26Z",
+ "pushed_at": "2023-08-07T18:56:40Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-3519.json b/2023/CVE-2023-3519.json
index f4c02e8851..3e3a68416b 100644
--- a/2023/CVE-2023-3519.json
+++ b/2023/CVE-2023-3519.json
@@ -338,6 +338,36 @@
"score": 0,
"subscribers_count": 7
},
+ {
+ "id": 682553540,
+ "name": "CVE-2023-3519",
+ "full_name": "Chocapikk\/CVE-2023-3519",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-3519",
+ "description": "Citrix ADC RCE CVE-2023-3519",
+ "fork": false,
+ "created_at": "2023-08-24T12:24:24Z",
+ "updated_at": "2023-11-13T09:03:16Z",
+ "pushed_at": "2023-08-30T15:47:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
{
"id": 685454983,
"name": "CVE-2023-3519-BackdoorCheck",
diff --git a/2023/CVE-2023-35885.json b/2023/CVE-2023-35885.json
index 00a4e52980..b32602aadb 100644
--- a/2023/CVE-2023-35885.json
+++ b/2023/CVE-2023-35885.json
@@ -28,5 +28,35 @@
"watchers": 52,
"score": 0,
"subscribers_count": 2
+ },
+ {
+ "id": 684030388,
+ "name": "CVE-2023-35885",
+ "full_name": "Chocapikk\/CVE-2023-35885",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-35885",
+ "description": "CloudPanel 2 Remote Code Execution Exploit",
+ "fork": false,
+ "created_at": "2023-08-28T09:58:41Z",
+ "updated_at": "2023-11-13T09:04:03Z",
+ "pushed_at": "2023-08-28T12:29:21Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2023/CVE-2023-36745.json b/2023/CVE-2023-36745.json
index f241997cb1..be93f68027 100644
--- a/2023/CVE-2023-36745.json
+++ b/2023/CVE-2023-36745.json
@@ -13,19 +13,19 @@
"description": null,
"fork": false,
"created_at": "2023-10-23T19:06:36Z",
- "updated_at": "2023-11-12T03:35:13Z",
+ "updated_at": "2023-11-13T12:20:04Z",
"pushed_at": "2023-10-29T11:12:26Z",
- "stargazers_count": 113,
- "watchers_count": 113,
+ "stargazers_count": 116,
+ "watchers_count": 116,
"has_discussions": false,
- "forks_count": 40,
+ "forks_count": 41,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 40,
- "watchers": 113,
+ "forks": 41,
+ "watchers": 116,
"score": 0,
"subscribers_count": 5
}
diff --git a/2023/CVE-2023-36846.json b/2023/CVE-2023-36846.json
index 8b146bbecc..172d10f1f8 100644
--- a/2023/CVE-2023-36846.json
+++ b/2023/CVE-2023-36846.json
@@ -1,4 +1,34 @@
[
+ {
+ "id": 684738638,
+ "name": "CVE-2023-36846",
+ "full_name": "Chocapikk\/CVE-2023-36846",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-36846",
+ "description": "Remote Code Execution on Junos OS CVE-2023-36846",
+ "fork": false,
+ "created_at": "2023-08-29T18:50:49Z",
+ "updated_at": "2023-11-13T09:03:38Z",
+ "pushed_at": "2023-08-29T18:51:51Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
{
"id": 694700558,
"name": "CVE-2023-36846",
diff --git a/2023/CVE-2023-38646.json b/2023/CVE-2023-38646.json
index e689d7f73d..e434d08c6e 100644
--- a/2023/CVE-2023-38646.json
+++ b/2023/CVE-2023-38646.json
@@ -95,6 +95,36 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 672405863,
+ "name": "CVE-2023-38646",
+ "full_name": "Chocapikk\/CVE-2023-38646",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-38646",
+ "description": "Remote Code Execution on Metabase CVE-2023-38646",
+ "fork": false,
+ "created_at": "2023-07-30T01:12:24Z",
+ "updated_at": "2023-11-13T09:05:01Z",
+ "pushed_at": "2023-07-30T01:12:52Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
{
"id": 672496252,
"name": "CVE-2023-38646-Poc",
diff --git a/2023/CVE-2023-38831.json b/2023/CVE-2023-38831.json
index 07c0ddc95b..382d52e92e 100644
--- a/2023/CVE-2023-38831.json
+++ b/2023/CVE-2023-38831.json
@@ -43,10 +43,10 @@
"description": "CVE-2023-38831 winrar exploit generator",
"fork": false,
"created_at": "2023-08-25T09:44:08Z",
- "updated_at": "2023-11-10T12:32:25Z",
+ "updated_at": "2023-11-13T09:29:29Z",
"pushed_at": "2023-11-06T10:49:40Z",
- "stargazers_count": 703,
- "watchers_count": 703,
+ "stargazers_count": 704,
+ "watchers_count": 704,
"has_discussions": false,
"forks_count": 128,
"allow_forking": true,
@@ -59,7 +59,7 @@
],
"visibility": "public",
"forks": 128,
- "watchers": 703,
+ "watchers": 704,
"score": 0,
"subscribers_count": 8
},
diff --git a/2023/CVE-2023-39526.json b/2023/CVE-2023-39526.json
index 37c004ce70..7378893f22 100644
--- a/2023/CVE-2023-39526.json
+++ b/2023/CVE-2023-39526.json
@@ -13,10 +13,10 @@
"description": "Prestashop fix vulnerability CVE-2023-39526 & CVE-2023-39527",
"fork": false,
"created_at": "2023-08-10T16:51:56Z",
- "updated_at": "2023-10-20T08:34:18Z",
+ "updated_at": "2023-11-13T10:41:25Z",
"pushed_at": "2023-08-10T16:57:43Z",
- "stargazers_count": 1,
- "watchers_count": 1,
+ "stargazers_count": 2,
+ "watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 1,
+ "watchers": 2,
"score": 0,
"subscribers_count": 1
}
diff --git a/2023/CVE-2023-42793.json b/2023/CVE-2023-42793.json
index a80b741b6c..98f5751edb 100644
--- a/2023/CVE-2023-42793.json
+++ b/2023/CVE-2023-42793.json
@@ -13,12 +13,12 @@
"description": "CVE-2023-42793",
"fork": false,
"created_at": "2023-09-29T06:43:35Z",
- "updated_at": "2023-10-31T15:03:28Z",
+ "updated_at": "2023-11-13T10:30:47Z",
"pushed_at": "2023-09-29T06:52:00Z",
- "stargazers_count": 10,
- "watchers_count": 10,
+ "stargazers_count": 11,
+ "watchers_count": 11,
"has_discussions": false,
- "forks_count": 2,
+ "forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -26,8 +26,8 @@
"cve-2023-42793"
],
"visibility": "public",
- "forks": 2,
- "watchers": 10,
+ "forks": 3,
+ "watchers": 11,
"score": 0,
"subscribers_count": 1
},
diff --git a/2023/CVE-2023-42820.json b/2023/CVE-2023-42820.json
index aedee76a78..9cd5324b98 100644
--- a/2023/CVE-2023-42820.json
+++ b/2023/CVE-2023-42820.json
@@ -43,10 +43,10 @@
"description": "CVE-2023-42820",
"fork": false,
"created_at": "2023-10-10T06:32:51Z",
- "updated_at": "2023-11-09T12:11:14Z",
+ "updated_at": "2023-11-13T06:38:38Z",
"pushed_at": "2023-10-29T12:12:32Z",
- "stargazers_count": 46,
- "watchers_count": 46,
+ "stargazers_count": 47,
+ "watchers_count": 47,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
- "watchers": 46,
+ "watchers": 47,
"score": 0,
"subscribers_count": 2
},
diff --git a/2023/CVE-2023-44487.json b/2023/CVE-2023-44487.json
index 90f20d8613..ece304a9c5 100644
--- a/2023/CVE-2023-44487.json
+++ b/2023/CVE-2023-44487.json
@@ -171,10 +171,10 @@
"description": "A python based exploit to test out rapid reset attack (CVE-2023-44487)",
"fork": false,
"created_at": "2023-10-16T11:07:50Z",
- "updated_at": "2023-10-27T15:01:43Z",
+ "updated_at": "2023-11-13T11:04:08Z",
"pushed_at": "2023-10-16T12:32:50Z",
- "stargazers_count": 7,
- "watchers_count": 7,
+ "stargazers_count": 8,
+ "watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@@ -193,7 +193,7 @@
],
"visibility": "public",
"forks": 2,
- "watchers": 7,
+ "watchers": 8,
"score": 0,
"subscribers_count": 1
},
diff --git a/2023/CVE-2023-46604.json b/2023/CVE-2023-46604.json
index c13e91ea18..101e754a1f 100644
--- a/2023/CVE-2023-46604.json
+++ b/2023/CVE-2023-46604.json
@@ -13,10 +13,10 @@
"description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具, 基于 Go 语言",
"fork": false,
"created_at": "2023-10-27T05:57:21Z",
- "updated_at": "2023-11-12T10:09:10Z",
+ "updated_at": "2023-11-13T08:15:51Z",
"pushed_at": "2023-11-03T12:50:06Z",
- "stargazers_count": 141,
- "watchers_count": 141,
+ "stargazers_count": 142,
+ "watchers_count": 142,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
- "watchers": 141,
+ "watchers": 142,
"score": 0,
"subscribers_count": 3
},
@@ -225,10 +225,10 @@
"description": "This script leverages CVE-2023046604 (Apache ActiveMQ) to generate a pseudo shell. The vulnerability allows for remote code execution due to unsafe deserialization within the OpenWire protocol.",
"fork": false,
"created_at": "2023-11-12T11:26:46Z",
- "updated_at": "2023-11-12T15:09:34Z",
+ "updated_at": "2023-11-13T09:41:31Z",
"pushed_at": "2023-11-12T13:50:09Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "stargazers_count": 1,
+ "watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -237,7 +237,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 0,
+ "watchers": 1,
"score": 0,
"subscribers_count": 1
},
diff --git a/2023/CVE-2023-46747.json b/2023/CVE-2023-46747.json
index 3b79bdf049..08fdb58754 100644
--- a/2023/CVE-2023-46747.json
+++ b/2023/CVE-2023-46747.json
@@ -43,10 +43,10 @@
"description": "exploit for cve-2023-46747",
"fork": false,
"created_at": "2023-11-01T09:31:05Z",
- "updated_at": "2023-11-10T16:59:29Z",
+ "updated_at": "2023-11-13T10:09:32Z",
"pushed_at": "2023-11-10T02:12:38Z",
- "stargazers_count": 105,
- "watchers_count": 105,
+ "stargazers_count": 106,
+ "watchers_count": 106,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
@@ -61,7 +61,7 @@
],
"visibility": "public",
"forks": 25,
- "watchers": 105,
+ "watchers": 106,
"score": 0,
"subscribers_count": 2
},
diff --git a/2023/CVE-2023-47129.json b/2023/CVE-2023-47129.json
new file mode 100644
index 0000000000..214358cc23
--- /dev/null
+++ b/2023/CVE-2023-47129.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 718117758,
+ "name": "CVE-2023-47129",
+ "full_name": "Cyber-Wo0dy\/CVE-2023-47129",
+ "owner": {
+ "login": "Cyber-Wo0dy",
+ "id": 148460873,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148460873?v=4",
+ "html_url": "https:\/\/github.com\/Cyber-Wo0dy"
+ },
+ "html_url": "https:\/\/github.com\/Cyber-Wo0dy\/CVE-2023-47129",
+ "description": "Statamic CMS versions <4.33.0 vulnerable to \"Remote Code Execution\" ",
+ "fork": false,
+ "created_at": "2023-11-13T12:21:52Z",
+ "updated_at": "2023-11-13T12:25:09Z",
+ "pushed_at": "2023-11-13T12:24:03Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-47529.json b/2023/CVE-2023-47529.json
new file mode 100644
index 0000000000..73e8c539bb
--- /dev/null
+++ b/2023/CVE-2023-47529.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 718085174,
+ "name": "CVE-2023-47529",
+ "full_name": "RandomRobbieBF\/CVE-2023-47529",
+ "owner": {
+ "login": "RandomRobbieBF",
+ "id": 51722811,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
+ "html_url": "https:\/\/github.com\/RandomRobbieBF"
+ },
+ "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2023-47529",
+ "description": "Cloud Templates & Patterns collection <= 1.2.2 - Sensitive Information Exposure via Log File",
+ "fork": false,
+ "created_at": "2023-11-13T10:50:25Z",
+ "updated_at": "2023-11-13T10:50:26Z",
+ "pushed_at": "2023-11-13T10:51:54Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-4911.json b/2023/CVE-2023-4911.json
index 4e36cb0a80..e16f2fc4fa 100644
--- a/2023/CVE-2023-4911.json
+++ b/2023/CVE-2023-4911.json
@@ -347,7 +347,7 @@
"description": "Looney Tunables CVE-2023-4911",
"fork": false,
"created_at": "2023-11-08T09:34:04Z",
- "updated_at": "2023-11-09T07:19:14Z",
+ "updated_at": "2023-11-13T08:09:54Z",
"pushed_at": "2023-11-08T09:40:31Z",
"stargazers_count": 1,
"watchers_count": 1,
diff --git a/2023/CVE-2023-5360.json b/2023/CVE-2023-5360.json
index a364c6130f..78861664d1 100644
--- a/2023/CVE-2023-5360.json
+++ b/2023/CVE-2023-5360.json
@@ -221,5 +221,37 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 718129350,
+ "name": "CVE-2023-5360",
+ "full_name": "1337r0j4n\/CVE-2023-5360",
+ "owner": {
+ "login": "1337r0j4n",
+ "id": 84887432,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84887432?v=4",
+ "html_url": "https:\/\/github.com\/1337r0j4n"
+ },
+ "html_url": "https:\/\/github.com\/1337r0j4n\/CVE-2023-5360",
+ "description": "CVE-2023-5360 Exploit\/POC",
+ "fork": false,
+ "created_at": "2023-11-13T12:51:34Z",
+ "updated_at": "2023-11-13T12:59:12Z",
+ "pushed_at": "2023-11-13T12:58:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-5360"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/README.md b/README.md
index 26d0332a33..510b7d28bc 100644
--- a/README.md
+++ b/README.md
@@ -233,6 +233,7 @@
In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behaviour, Denial of Service and full system compromise.
+- [Chocapikk/CVE-2023-1698](https://github.com/Chocapikk/CVE-2023-1698)
- [deIndra/CVE-2023-1698](https://github.com/deIndra/CVE-2023-1698)
- [thedarknessdied/WAGO-CVE-2023-1698](https://github.com/thedarknessdied/WAGO-CVE-2023-1698)
@@ -573,6 +574,7 @@
- [passwa11/CVE-2023-3519](https://github.com/passwa11/CVE-2023-3519)
- [rwincey/cve-2023-3519](https://github.com/rwincey/cve-2023-3519)
- [mandiant/citrix-ioc-scanner-cve-2023-3519](https://github.com/mandiant/citrix-ioc-scanner-cve-2023-3519)
+- [Chocapikk/CVE-2023-3519](https://github.com/Chocapikk/CVE-2023-3519)
- [JonaNeidhart/CVE-2023-3519-BackdoorCheck](https://github.com/JonaNeidhart/CVE-2023-3519-BackdoorCheck)
- [Aicks/Citrix-CVE-2023-3519](https://github.com/Aicks/Citrix-CVE-2023-3519)
- [Mohammaddvd/CVE-2023-3519](https://github.com/Mohammaddvd/CVE-2023-3519)
@@ -859,6 +861,7 @@
- [tucommenceapousser/CVE-2023-5360](https://github.com/tucommenceapousser/CVE-2023-5360)
- [Jenderal92/WP-CVE-2023-5360](https://github.com/Jenderal92/WP-CVE-2023-5360)
- [Pushkarup/CVE-2023-5360](https://github.com/Pushkarup/CVE-2023-5360)
+- [1337r0j4n/CVE-2023-5360](https://github.com/1337r0j4n/CVE-2023-5360)
### CVE-2023-5412 (2023-10-31)
@@ -1976,6 +1979,7 @@
- [nuts7/CVE-2023-27372](https://github.com/nuts7/CVE-2023-27372)
+- [Chocapikk/CVE-2023-27372](https://github.com/Chocapikk/CVE-2023-27372)
- [0SPwn/CVE-2023-27372-PoC](https://github.com/0SPwn/CVE-2023-27372-PoC)
- [izzz0/CVE-2023-27372-POC](https://github.com/izzz0/CVE-2023-27372-POC)
- [Pari-Malam/CVE-2023-27372](https://github.com/Pari-Malam/CVE-2023-27372)
@@ -2124,6 +2128,7 @@
- [fortra/CVE-2023-28252](https://github.com/fortra/CVE-2023-28252)
+- [Danasuley/CVE-2023-28252-](https://github.com/Danasuley/CVE-2023-28252-)
### CVE-2023-28310 (2023-06-14)
@@ -2173,6 +2178,7 @@
- [CHINA-china/MinIO_CVE-2023-28432_EXP](https://github.com/CHINA-china/MinIO_CVE-2023-28432_EXP)
- [TaroballzChen/CVE-2023-28432-metasploit-scanner](https://github.com/TaroballzChen/CVE-2023-28432-metasploit-scanner)
- [bingtangbanli/CVE-2023-28432](https://github.com/bingtangbanli/CVE-2023-28432)
+- [Chocapikk/CVE-2023-28432](https://github.com/Chocapikk/CVE-2023-28432)
- [yTxZx/CVE-2023-28432](https://github.com/yTxZx/CVE-2023-28432)
### CVE-2023-28434 (2023-03-22)
@@ -3032,6 +3038,7 @@
An OS Command Injection vulnerability in Parks Fiberlink 210 firmware version V2.1.14_X000 was found via the /boaform/admin/formPing target_addr parameter.
+- [Chocapikk/CVE-2023-33617](https://github.com/Chocapikk/CVE-2023-33617)
- [tucommenceapousser/CVE-2023-33617](https://github.com/tucommenceapousser/CVE-2023-33617)
### CVE-2023-33668 (2023-07-12)
@@ -3372,6 +3379,13 @@
- [emanueldosreis/nmap-CVE-2023-35078-Exploit](https://github.com/emanueldosreis/nmap-CVE-2023-35078-Exploit)
- [Blue-number/CVE-2023-35078](https://github.com/Blue-number/CVE-2023-35078)
+### CVE-2023-35082 (2023-08-15)
+
+An authentication bypass vulnerability in Ivanti EPMM 11.10 and older, allows unauthorized users to access restricted functionality or resources of the application without proper authentication. This vulnerability is unique to CVE-2023-35078 announced earlier.
+
+
+- [Chocapikk/CVE-2023-35082](https://github.com/Chocapikk/CVE-2023-35082)
+
### CVE-2023-35086 (2023-07-21)
\nIt is identified a format string vulnerability in ASUS RT-AX56U V2 & RT-AC86U. This vulnerability is caused by directly using input as a format string when calling syslog in logmessage_normal function, in the do_detwan_cgi module of httpd. An unauthenticated remote attacker without privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service.\n\nThis issue affects RT-AX56U V2: 3.0.0.4.386_50460; RT-AC86U: 3.0.0.4_386_51529.\n\n
@@ -3466,6 +3480,7 @@
- [datackmy/FallingSkies-CVE-2023-35885](https://github.com/datackmy/FallingSkies-CVE-2023-35885)
+- [Chocapikk/CVE-2023-35885](https://github.com/Chocapikk/CVE-2023-35885)
### CVE-2023-36076 (2023-09-01)
@@ -3634,6 +3649,7 @@
A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity.\n\n\n\nWith a specific request to user.php that doesn't require authentication an attacker is able to upload arbitrary files via J-Web, leading to a loss of \n\nintegrity\n\nfor a certain \n\npart of the file system, which may allow chaining to other vulnerabilities.\n\n\nThis issue affects Juniper Networks Junos OS on SRX Series:\n\n\n\n * All versions prior to 20.4R3-S8;\n * 21.1 versions 21.1R1 and later;\n * 21.2 versions prior to 21.2R3-S6;\n * 21.3 versions \n\nprior to \n\n 21.3R3-S5;\n * 21.4 versions \n\nprior to \n\n21.4R3-S5;\n * 22.1 versions \n\nprior to \n\n22.1R3-S3;\n * 22.2 versions \n\nprior to \n\n22.2R3-S2;\n * 22.3 versions \n\nprior to \n\n22.3R2-S2, 22.3R3;\n * 22.4 versions \n\nprior to \n\n22.4R2-S1, 22.4R3.\n\n\n\n\n
+- [Chocapikk/CVE-2023-36846](https://github.com/Chocapikk/CVE-2023-36846)
- [Dreamy-elfland/CVE-2023-36846](https://github.com/Dreamy-elfland/CVE-2023-36846)
### CVE-2023-36874 (2023-07-11)
@@ -3926,6 +3942,7 @@
- [adriyansyah-mf/CVE-2023-38646--Metabase-](https://github.com/adriyansyah-mf/CVE-2023-38646--Metabase-)
- [Pumpkin-Garden/POC_Metabase_CVE-2023-38646](https://github.com/Pumpkin-Garden/POC_Metabase_CVE-2023-38646)
- [0xrobiul/CVE-2023-38646](https://github.com/0xrobiul/CVE-2023-38646)
+- [Chocapikk/CVE-2023-38646](https://github.com/Chocapikk/CVE-2023-38646)
- [Xuxfff/CVE-2023-38646-Poc](https://github.com/Xuxfff/CVE-2023-38646-Poc)
- [securezeron/CVE-2023-38646](https://github.com/securezeron/CVE-2023-38646)
- [LazyySec/CVE-2023-38646](https://github.com/LazyySec/CVE-2023-38646)
@@ -5087,6 +5104,13 @@
- [BaadMaro/CVE-2023-47119](https://github.com/BaadMaro/CVE-2023-47119)
+### CVE-2023-47129 (2023-11-10)
+
+Statmic is a core Laravel content management system Composer package. Prior to versions 3.4.13 and 4.33.0, on front-end forms with an asset upload field, PHP files crafted to look like images may be uploaded. This only affects forms using the "Forms" feature and not just _any_ arbitrary form. This does not affect the control panel. This issue has been patched in 3.4.13 and 4.33.0.\n
+
+
+- [Cyber-Wo0dy/CVE-2023-47129](https://github.com/Cyber-Wo0dy/CVE-2023-47129)
+
### CVE-2023-47179
- [RandomRobbieBF/CVE-2023-47179](https://github.com/RandomRobbieBF/CVE-2023-47179)
@@ -5103,6 +5127,9 @@
### CVE-2023-47460
- [aleksey-vi/CVE-2023-47460](https://github.com/aleksey-vi/CVE-2023-47460)
+### CVE-2023-47529
+- [RandomRobbieBF/CVE-2023-47529](https://github.com/RandomRobbieBF/CVE-2023-47529)
+
### CVE-2023-51504
- [Sybelle03/CVE-2023-51504](https://github.com/Sybelle03/CVE-2023-51504)
@@ -6800,6 +6827,7 @@
- [MLX15/CVE-2022-22954](https://github.com/MLX15/CVE-2022-22954)
- [mhurts/CVE-2022-22954-POC](https://github.com/mhurts/CVE-2022-22954-POC)
- [nguyenv1nK/CVE-2022-22954](https://github.com/nguyenv1nK/CVE-2022-22954)
+- [Chocapikk/CVE-2022-22954](https://github.com/Chocapikk/CVE-2022-22954)
- [secfb/CVE-2022-22954](https://github.com/secfb/CVE-2022-22954)
- [orwagodfather/CVE-2022-22954](https://github.com/orwagodfather/CVE-2022-22954)
- [b4dboy17/CVE-2022-22954](https://github.com/b4dboy17/CVE-2022-22954)
@@ -7276,6 +7304,13 @@
- [comrade99/CVE-2022-24181](https://github.com/comrade99/CVE-2022-24181)
+### CVE-2022-24227 (2022-02-15)
+
+A cross-site scripting (XSS) vulnerability in BoltWire v7.10 and v 8.00 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the name and lastname parameters.
+
+
+- [Cyber-Wo0dy/CVE-2022-24227-updated](https://github.com/Cyber-Wo0dy/CVE-2022-24227-updated)
+
### CVE-2022-24342 (2022-02-25)
In JetBrains TeamCity before 2021.2.1, URL injection leading to CSRF was possible.
@@ -7788,6 +7823,7 @@
- [cai-niao98/CVE-2022-26134](https://github.com/cai-niao98/CVE-2022-26134)
- [sunny-kathuria/exploit_CVE-2022-26134](https://github.com/sunny-kathuria/exploit_CVE-2022-26134)
- [KeepWannabe/BotCon](https://github.com/KeepWannabe/BotCon)
+- [Chocapikk/CVE-2022-26134](https://github.com/Chocapikk/CVE-2022-26134)
- [AmoloHT/CVE-2022-26134](https://github.com/AmoloHT/CVE-2022-26134)
- [kh4sh3i/CVE-2022-26134](https://github.com/kh4sh3i/CVE-2022-26134)
- [ColdFusionX/CVE-2022-26134](https://github.com/ColdFusionX/CVE-2022-26134)
@@ -8091,6 +8127,7 @@
- [miko550/CVE-2022-27925](https://github.com/miko550/CVE-2022-27925)
- [navokus/CVE-2022-27925](https://github.com/navokus/CVE-2022-27925)
- [Josexv1/CVE-2022-27925](https://github.com/Josexv1/CVE-2022-27925)
+- [Chocapikk/CVE-2022-27925-Revshell](https://github.com/Chocapikk/CVE-2022-27925-Revshell)
- [akincibor/CVE-2022-27925](https://github.com/akincibor/CVE-2022-27925)
- [lolminerxmrig/CVE-2022-27925-Revshell](https://github.com/lolminerxmrig/CVE-2022-27925-Revshell)
- [touchmycrazyredhat/CVE-2022-27925-Revshell](https://github.com/touchmycrazyredhat/CVE-2022-27925-Revshell)
@@ -8375,6 +8412,7 @@
SolarView Compact ver.6.00 was discovered to contain a command injection vulnerability via conf_mail.php.
+- [Chocapikk/CVE-2022-29303](https://github.com/Chocapikk/CVE-2022-29303)
- [1f3lse/CVE-2022-29303](https://github.com/1f3lse/CVE-2022-29303)
### CVE-2022-29337 (2022-05-24)
@@ -8437,6 +8475,7 @@
- [axin2019/CVE-2022-29464](https://github.com/axin2019/CVE-2022-29464)
- [LinJacck/CVE-2022-29464](https://github.com/LinJacck/CVE-2022-29464)
- [Inplex-sys/CVE-2022-29464-loader](https://github.com/Inplex-sys/CVE-2022-29464-loader)
+- [Chocapikk/CVE-2022-29464](https://github.com/Chocapikk/CVE-2022-29464)
- [jimidk/Better-CVE-2022-29464](https://github.com/jimidk/Better-CVE-2022-29464)
- [electr0lulz/Mass-exploit-CVE-2022-29464](https://github.com/electr0lulz/Mass-exploit-CVE-2022-29464)
- [xinghonghaoyue/CVE-2022-29464](https://github.com/xinghonghaoyue/CVE-2022-29464)
@@ -8786,6 +8825,7 @@
- [M4fiaB0y/CVE-2022-30525](https://github.com/M4fiaB0y/CVE-2022-30525)
- [k0sf/CVE-2022-30525](https://github.com/k0sf/CVE-2022-30525)
- [superzerosec/CVE-2022-30525](https://github.com/superzerosec/CVE-2022-30525)
+- [Chocapikk/CVE-2022-30525-Reverse-Shell](https://github.com/Chocapikk/CVE-2022-30525-Reverse-Shell)
- [160Team/CVE-2022-30525](https://github.com/160Team/CVE-2022-30525)
- [zhefox/CVE-2022-30525-Reverse-Shell](https://github.com/zhefox/CVE-2022-30525-Reverse-Shell)
- [iveresk/cve-2022-30525](https://github.com/iveresk/cve-2022-30525)
@@ -9075,6 +9115,7 @@
- [Madliife0/CVE-2022-31814](https://github.com/Madliife0/CVE-2022-31814)
- [TheUnknownSoul/CVE-2022-31814](https://github.com/TheUnknownSoul/CVE-2022-31814)
- [drcayber/RCE](https://github.com/drcayber/RCE)
+- [Chocapikk/CVE-2022-31814](https://github.com/Chocapikk/CVE-2022-31814)
- [dkstar11q/CVE-2022-31814](https://github.com/dkstar11q/CVE-2022-31814)
### CVE-2022-31854 (2022-07-07)
@@ -9664,6 +9705,7 @@
- [fed-speak/CVE-2022-36804-PoC-Exploit](https://github.com/fed-speak/CVE-2022-36804-PoC-Exploit)
- [Vulnmachines/bitbucket-cve-2022-36804](https://github.com/Vulnmachines/bitbucket-cve-2022-36804)
- [kljunowsky/CVE-2022-36804-POC](https://github.com/kljunowsky/CVE-2022-36804-POC)
+- [Chocapikk/CVE-2022-36804-ReverseShell](https://github.com/Chocapikk/CVE-2022-36804-ReverseShell)
- [khal4n1/CVE-2022-36804](https://github.com/khal4n1/CVE-2022-36804)
- [vj4336/CVE-2022-36804-ReverseShell](https://github.com/vj4336/CVE-2022-36804-ReverseShell)
- [tahtaciburak/cve-2022-36804](https://github.com/tahtaciburak/cve-2022-36804)
@@ -9997,6 +10039,7 @@
- [horizon3ai/CVE-2022-39952](https://github.com/horizon3ai/CVE-2022-39952)
- [shiyeshu/CVE-2022-39952_webshell](https://github.com/shiyeshu/CVE-2022-39952_webshell)
+- [Chocapikk/CVE-2022-39952](https://github.com/Chocapikk/CVE-2022-39952)
- [dkstar11q/CVE-2022-39952-better](https://github.com/dkstar11q/CVE-2022-39952-better)
### CVE-2022-39959 (2022-10-07)
@@ -10131,6 +10174,7 @@
- [iveresk/CVE-2022-40684](https://github.com/iveresk/CVE-2022-40684)
- [mhd108/CVE-2022-40684](https://github.com/mhd108/CVE-2022-40684)
- [ClickCyber/cve-2022-40684](https://github.com/ClickCyber/cve-2022-40684)
+- [Chocapikk/CVE-2022-40684](https://github.com/Chocapikk/CVE-2022-40684)
- [mohamedbenchikh/CVE-2022-40684](https://github.com/mohamedbenchikh/CVE-2022-40684)
- [HAWA771/CVE-2022-40684](https://github.com/HAWA771/CVE-2022-40684)
- [NeriaBasha/CVE-2022-40684](https://github.com/NeriaBasha/CVE-2022-40684)
@@ -10805,6 +10849,7 @@
- [numanturle/CVE-2022-44877](https://github.com/numanturle/CVE-2022-44877)
- [komomon/CVE-2022-44877-RCE](https://github.com/komomon/CVE-2022-44877-RCE)
- [ColdFusionX/CVE-2022-44877-CWP7](https://github.com/ColdFusionX/CVE-2022-44877-CWP7)
+- [Chocapikk/CVE-2022-44877](https://github.com/Chocapikk/CVE-2022-44877)
- [hotpotcookie/CVE-2022-44877-white-box](https://github.com/hotpotcookie/CVE-2022-44877-white-box)
- [RicYaben/CVE-2022-44877-LAB](https://github.com/RicYaben/CVE-2022-44877-LAB)
- [dkstar11q/CVE-2022-44877](https://github.com/dkstar11q/CVE-2022-44877)
@@ -14990,6 +15035,13 @@
- [zer0qs/CVE-2021-35042](https://github.com/zer0qs/CVE-2021-35042)
- [LUUANHDUC/CVE-2021-35042](https://github.com/LUUANHDUC/CVE-2021-35042)
+### CVE-2021-35064 (2021-07-12)
+
+KramerAV VIAWare, all tested versions, allow privilege escalation through misconfiguration of sudo. Sudoers permits running of multiple dangerous commands, including unzip, systemctl and dpkg.
+
+
+- [Chocapikk/CVE-2021-35064](https://github.com/Chocapikk/CVE-2021-35064)
+
### CVE-2021-35211 (2021-07-14)
Microsoft discovered a remote code execution (RCE) vulnerability in the SolarWinds Serv-U product utilizing a Remote Memory Escape Vulnerability. If exploited, a threat actor may be able to gain privileged access to the machine hosting Serv-U Only. SolarWinds Serv-U Managed File Transfer and Serv-U Secure FTP for Windows before 15.2.3 HF2 are affected by this vulnerability.
@@ -16191,6 +16243,7 @@
- [bernardas/netsec-polygon](https://github.com/bernardas/netsec-polygon)
- [CalfCrusher/Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit](https://github.com/CalfCrusher/Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit)
- [vuongnv3389-sec/cve-2021-41773](https://github.com/vuongnv3389-sec/cve-2021-41773)
+- [Chocapikk/CVE-2021-41773](https://github.com/Chocapikk/CVE-2021-41773)
- [wangfly-me/Apache_Penetration_Tool](https://github.com/wangfly-me/Apache_Penetration_Tool)
- [anldori/CVE-2021-41773-Scanner](https://github.com/anldori/CVE-2021-41773-Scanner)
- [iosifache/ApacheRCEEssay](https://github.com/iosifache/ApacheRCEEssay)
@@ -17736,6 +17789,7 @@
- [nobodyatall648/CVE-2021-46422](https://github.com/nobodyatall648/CVE-2021-46422)
+- [Chocapikk/CVE-2021-46422](https://github.com/Chocapikk/CVE-2021-46422)
- [twoning/CVE-2021-46422_PoC](https://github.com/twoning/CVE-2021-46422_PoC)
- [Awei507/CVE-RCE](https://github.com/Awei507/CVE-RCE)
- [yigexioabai/CVE-2021-46422_RCE](https://github.com/yigexioabai/CVE-2021-46422_RCE)
@@ -26310,6 +26364,7 @@
FreeSWITCH 1.6.10 through 1.10.1 has a default password in event_socket.conf.xml.
+- [Chocapikk/CVE-2019-19492](https://github.com/Chocapikk/CVE-2019-19492)
- [tucommenceapousser/CVE-2019-19492](https://github.com/tucommenceapousser/CVE-2019-19492)
- [tucommenceapousser/CVE-2019-19492-2](https://github.com/tucommenceapousser/CVE-2019-19492-2)
@@ -37102,7 +37157,6 @@
- [websecnl/Bulk_CVE-1999-0532_Scanner](https://github.com/websecnl/Bulk_CVE-1999-0532_Scanner)
-- [Rodney-O-C-Melby/dns-zone-transfer-test](https://github.com/Rodney-O-C-Melby/dns-zone-transfer-test)
### CVE-1999-1053 (2001-09-12)