From 4cc2c2e4080574e9a5a58a0d3567083461c64004 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Fri, 17 Jan 2025 15:32:27 +0900 Subject: [PATCH] Auto Update 2025/01/17 06:32:27 --- 2017/CVE-2017-0100.json | 8 +-- 2017/CVE-2017-12615.json | 8 +-- 2017/CVE-2017-7921.json | 8 +-- 2018/CVE-2018-19320.json | 8 +-- 2018/CVE-2018-8453.json | 8 +-- 2020/CVE-2020-1472.json | 8 +-- 2020/CVE-2020-14882.json | 8 +-- 2020/CVE-2020-1938.json | 8 +-- 2021/CVE-2021-3156.json | 8 +-- 2021/CVE-2021-44228.json | 8 +-- 2022/CVE-2022-0847.json | 8 +-- 2022/CVE-2022-31814.json | 2 +- 2022/CVE-2022-3368.json | 8 +-- 2022/CVE-2022-36537.json | 8 +-- 2022/CVE-2022-40684.json | 16 ++--- 2023/CVE-2023-22515.json | 31 ---------- 2023/CVE-2023-24329.json | 31 ---------- 2023/CVE-2023-25136.json | 2 +- 2023/CVE-2023-27163.json | 62 -------------------- 2023/CVE-2023-28252.json | 31 ---------- 2023/CVE-2023-28432.json | 31 ---------- 2023/CVE-2023-29343.json | 8 +-- 2023/CVE-2023-29357.json | 31 ---------- 2023/CVE-2023-31446.json | 33 ----------- 2023/CVE-2023-32315.json | 8 +-- 2023/CVE-2023-34362.json | 31 ---------- 2023/CVE-2023-36874.json | 8 +-- 2023/CVE-2023-38408.json | 39 ++---------- 2023/CVE-2023-38646.json | 31 ---------- 2023/CVE-2023-40084.json | 33 ----------- 2023/CVE-2023-45866.json | 8 +-- 2023/CVE-2023-48981.json | 33 ----------- 2023/CVE-2023-48982.json | 33 ----------- 2023/CVE-2023-48983.json | 33 ----------- 2023/CVE-2023-49070.json | 31 ---------- 2023/CVE-2023-51073.json | 33 ----------- 2023/CVE-2023-51126.json | 33 ----------- 2023/CVE-2023-51127.json | 33 ----------- 2023/CVE-2023-51385.json | 124 --------------------------------------- 2023/CVE-2023-51467.json | 62 -------------------- 2023/CVE-2023-51764.json | 31 ---------- 2023/CVE-2023-7172.json | 33 ----------- 2023/CVE-2023-7173.json | 33 ----------- 2024/CVE-2024-1086.json | 8 +-- 2024/CVE-2024-20656.json | 12 ++-- 2024/CVE-2024-30051.json | 8 +-- 2024/CVE-2024-43468.json | 12 ++-- 2024/CVE-2024-44258.json | 8 +-- 2024/CVE-2024-49138.json | 12 ++-- 2024/CVE-2024-53691.json | 12 ++-- 2024/CVE-2024-55591.json | 12 ++-- 2024/CVE-2024-57784.json | 33 +++++++++++ 2024/CVE-2024-57785.json | 33 +++++++++++ 2025/CVE-2025-0282.json | 16 ++--- README.md | 90 +++++----------------------- 55 files changed, 212 insertions(+), 1096 deletions(-) delete mode 100644 2023/CVE-2023-31446.json delete mode 100644 2023/CVE-2023-40084.json delete mode 100644 2023/CVE-2023-48981.json delete mode 100644 2023/CVE-2023-48982.json delete mode 100644 2023/CVE-2023-48983.json delete mode 100644 2023/CVE-2023-51073.json delete mode 100644 2023/CVE-2023-51126.json delete mode 100644 2023/CVE-2023-51127.json delete mode 100644 2023/CVE-2023-7172.json delete mode 100644 2023/CVE-2023-7173.json create mode 100644 2024/CVE-2024-57784.json create mode 100644 2024/CVE-2024-57785.json diff --git a/2017/CVE-2017-0100.json b/2017/CVE-2017-0100.json index 35c4865ce7..9cbc97764e 100644 --- a/2017/CVE-2017-0100.json +++ b/2017/CVE-2017-0100.json @@ -14,10 +14,10 @@ "description": "CVE-2017-0100、MS17-012、Eop", "fork": false, "created_at": "2021-03-24T09:21:09Z", - "updated_at": "2024-11-27T09:16:12Z", + "updated_at": "2025-01-17T05:34:18Z", "pushed_at": "2021-03-24T09:39:17Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 4, - "watchers": 9, + "watchers": 10, "score": 0, "subscribers_count": 3 } diff --git a/2017/CVE-2017-12615.json b/2017/CVE-2017-12615.json index 86d3649b29..e9fa2b32de 100644 --- a/2017/CVE-2017-12615.json +++ b/2017/CVE-2017-12615.json @@ -417,10 +417,10 @@ "description": "tomcat自动化漏洞扫描利用工具,支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含", "fork": false, "created_at": "2024-08-29T06:38:16Z", - "updated_at": "2025-01-16T02:49:52Z", + "updated_at": "2025-01-17T03:21:16Z", "pushed_at": "2024-11-13T03:12:58Z", - "stargazers_count": 175, - "watchers_count": 175, + "stargazers_count": 176, + "watchers_count": 176, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -437,7 +437,7 @@ ], "visibility": "public", "forks": 16, - "watchers": 175, + "watchers": 176, "score": 0, "subscribers_count": 2 }, diff --git a/2017/CVE-2017-7921.json b/2017/CVE-2017-7921.json index a15bd344eb..652625eb86 100644 --- a/2017/CVE-2017-7921.json +++ b/2017/CVE-2017-7921.json @@ -262,10 +262,10 @@ "description": "A PoC exploit for CVE-2017-7921 - Hikvision Camera Series Improper Authentication Vulnerability.", "fork": false, "created_at": "2023-07-24T14:48:38Z", - "updated_at": "2025-01-11T21:50:02Z", + "updated_at": "2025-01-17T01:49:23Z", "pushed_at": "2023-08-02T18:58:22Z", - "stargazers_count": 17, - "watchers_count": 17, + "stargazers_count": 18, + "watchers_count": 18, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -284,7 +284,7 @@ ], "visibility": "public", "forks": 5, - "watchers": 17, + "watchers": 18, "score": 0, "subscribers_count": 1 }, diff --git a/2018/CVE-2018-19320.json b/2018/CVE-2018-19320.json index 57a745e3b8..de0e20b43c 100644 --- a/2018/CVE-2018-19320.json +++ b/2018/CVE-2018-19320.json @@ -76,10 +76,10 @@ "description": "Unsigned driver loader using CVE-2018-19320", "fork": false, "created_at": "2022-11-12T05:48:13Z", - "updated_at": "2025-01-14T04:54:09Z", + "updated_at": "2025-01-17T02:08:32Z", "pushed_at": "2023-04-09T13:50:29Z", - "stargazers_count": 223, - "watchers_count": 223, + "stargazers_count": 224, + "watchers_count": 224, "has_discussions": false, "forks_count": 59, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 59, - "watchers": 223, + "watchers": 224, "score": 0, "subscribers_count": 10 } diff --git a/2018/CVE-2018-8453.json b/2018/CVE-2018-8453.json index 2ea936fdcf..4d222b614a 100644 --- a/2018/CVE-2018-8453.json +++ b/2018/CVE-2018-8453.json @@ -45,10 +45,10 @@ "description": "cve-2018-8453 exp", "fork": false, "created_at": "2019-01-18T10:40:03Z", - "updated_at": "2024-12-30T08:48:20Z", + "updated_at": "2025-01-17T02:29:49Z", "pushed_at": "2019-12-13T02:24:39Z", - "stargazers_count": 121, - "watchers_count": 121, + "stargazers_count": 122, + "watchers_count": 122, "has_discussions": false, "forks_count": 53, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 53, - "watchers": 121, + "watchers": 122, "score": 0, "subscribers_count": 8 }, diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index 2c18c49eb2..62507228b7 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -45,10 +45,10 @@ "description": "Test tool for CVE-2020-1472", "fork": false, "created_at": "2020-09-08T08:58:37Z", - "updated_at": "2025-01-16T04:06:07Z", + "updated_at": "2025-01-17T04:40:16Z", "pushed_at": "2023-07-20T10:51:42Z", - "stargazers_count": 1749, - "watchers_count": 1749, + "stargazers_count": 1750, + "watchers_count": 1750, "has_discussions": false, "forks_count": 358, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 358, - "watchers": 1749, + "watchers": 1750, "score": 0, "subscribers_count": 86 }, diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index c7fdc42371..8f4e04c14f 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -313,10 +313,10 @@ "description": "CVE-2020-14882_ALL综合利用工具,支持命令回显检测、批量命令回显、外置xml无回显命令执行等功能。", "fork": false, "created_at": "2020-11-03T10:49:35Z", - "updated_at": "2024-12-28T12:35:31Z", + "updated_at": "2025-01-17T01:04:41Z", "pushed_at": "2022-03-29T02:08:45Z", - "stargazers_count": 144, - "watchers_count": 144, + "stargazers_count": 145, + "watchers_count": 145, "has_discussions": false, "forks_count": 39, "allow_forking": true, @@ -325,7 +325,7 @@ "topics": [], "visibility": "public", "forks": 39, - "watchers": 144, + "watchers": 145, "score": 0, "subscribers_count": 3 }, diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index 732ae7bc93..2cb45521ec 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -981,10 +981,10 @@ "description": "tomcat自动化漏洞扫描利用工具,支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含", "fork": false, "created_at": "2024-08-29T06:38:16Z", - "updated_at": "2025-01-16T02:49:52Z", + "updated_at": "2025-01-17T03:21:16Z", "pushed_at": "2024-11-13T03:12:58Z", - "stargazers_count": 175, - "watchers_count": 175, + "stargazers_count": 176, + "watchers_count": 176, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -1001,7 +1001,7 @@ ], "visibility": "public", "forks": 16, - "watchers": 175, + "watchers": 176, "score": 0, "subscribers_count": 2 }, diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index b03cd59b76..f3378231b2 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -1017,10 +1017,10 @@ "description": "CVE-2021-3156非交互式执行命令", "fork": false, "created_at": "2021-02-09T19:25:18Z", - "updated_at": "2024-12-27T13:25:16Z", + "updated_at": "2025-01-17T02:21:49Z", "pushed_at": "2021-02-09T19:31:33Z", - "stargazers_count": 200, - "watchers_count": 200, + "stargazers_count": 201, + "watchers_count": 201, "has_discussions": false, "forks_count": 42, "allow_forking": true, @@ -1029,7 +1029,7 @@ "topics": [], "visibility": "public", "forks": 42, - "watchers": 200, + "watchers": 201, "score": 0, "subscribers_count": 6 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index cdcda3df27..624f28b432 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -12004,10 +12004,10 @@ "description": "💣💥💀 Proof of Concept: пример запуска fork-бомбы на удаленном сервере благодаря уязвимости CVE-2021-44228", "fork": false, "created_at": "2023-04-15T12:47:39Z", - "updated_at": "2023-05-06T18:26:50Z", + "updated_at": "2025-01-17T05:53:28Z", "pushed_at": "2023-05-02T21:46:29Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -12016,7 +12016,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 }, diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index d71398d742..edfd07c2f6 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -107,10 +107,10 @@ "description": "A root exploit for CVE-2022-0847 (Dirty Pipe)", "fork": false, "created_at": "2022-03-07T18:55:20Z", - "updated_at": "2025-01-12T10:36:38Z", + "updated_at": "2025-01-17T04:26:20Z", "pushed_at": "2022-03-08T06:20:05Z", - "stargazers_count": 1093, - "watchers_count": 1093, + "stargazers_count": 1092, + "watchers_count": 1092, "has_discussions": false, "forks_count": 220, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 220, - "watchers": 1093, + "watchers": 1092, "score": 0, "subscribers_count": 18 }, diff --git a/2022/CVE-2022-31814.json b/2022/CVE-2022-31814.json index b814f4f682..26eb6662a3 100644 --- a/2022/CVE-2022-31814.json +++ b/2022/CVE-2022-31814.json @@ -291,6 +291,6 @@ "forks": 0, "watchers": 1, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2022/CVE-2022-3368.json b/2022/CVE-2022-3368.json index 15f77e19a3..b544640801 100644 --- a/2022/CVE-2022-3368.json +++ b/2022/CVE-2022-3368.json @@ -45,10 +45,10 @@ "description": "it's a CVE-2022-3368 (Patched), but feel free to use it for check any outdated software or reseach", "fork": false, "created_at": "2024-03-05T18:31:29Z", - "updated_at": "2024-11-17T16:50:59Z", + "updated_at": "2025-01-17T00:38:32Z", "pushed_at": "2024-07-08T16:18:51Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 7, + "watchers": 8, "score": 0, "subscribers_count": 1 } diff --git a/2022/CVE-2022-36537.json b/2022/CVE-2022-36537.json index 31ddda05d5..ee52d96e18 100644 --- a/2022/CVE-2022-36537.json +++ b/2022/CVE-2022-36537.json @@ -49,10 +49,10 @@ "description": "POC of CVE-2022-36537", "fork": false, "created_at": "2022-12-09T14:15:52Z", - "updated_at": "2024-08-12T20:28:47Z", + "updated_at": "2025-01-17T00:56:17Z", "pushed_at": "2025-01-09T07:54:42Z", - "stargazers_count": 35, - "watchers_count": 35, + "stargazers_count": 36, + "watchers_count": 36, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -69,7 +69,7 @@ ], "visibility": "public", "forks": 6, - "watchers": 35, + "watchers": 36, "score": 0, "subscribers_count": 1 } diff --git a/2022/CVE-2022-40684.json b/2022/CVE-2022-40684.json index 456b11b97c..dfc27a37d3 100644 --- a/2022/CVE-2022-40684.json +++ b/2022/CVE-2022-40684.json @@ -743,21 +743,21 @@ "description": "Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group", "fork": false, "created_at": "2025-01-16T06:54:15Z", - "updated_at": "2025-01-17T00:22:01Z", + "updated_at": "2025-01-17T04:41:20Z", "pushed_at": "2025-01-16T09:56:36Z", - "stargazers_count": 32, - "watchers_count": 32, + "stargazers_count": 33, + "watchers_count": 33, "has_discussions": false, - "forks_count": 10, + "forks_count": 11, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 10, - "watchers": 32, + "forks": 11, + "watchers": 33, "score": 0, - "subscribers_count": 0 + "subscribers_count": 5 }, { "id": 917925392, @@ -788,6 +788,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-22515.json b/2023/CVE-2023-22515.json index 085415da97..68a9917004 100644 --- a/2023/CVE-2023-22515.json +++ b/2023/CVE-2023-22515.json @@ -593,37 +593,6 @@ "score": 0, "subscribers_count": 0 }, - { - "id": 738213429, - "name": "Exploit-CVE-2023-22515", - "full_name": "CalegariMindSec\/Exploit-CVE-2023-22515", - "owner": { - "login": "CalegariMindSec", - "id": 68512056, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68512056?v=4", - "html_url": "https:\/\/github.com\/CalegariMindSec", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/CalegariMindSec\/Exploit-CVE-2023-22515", - "description": "A simple exploit for CVE-2023-22515", - "fork": false, - "created_at": "2024-01-02T17:40:24Z", - "updated_at": "2024-01-02T23:11:04Z", - "pushed_at": "2024-01-02T23:15:55Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 762759550, "name": "CVE-2023-22515", diff --git a/2023/CVE-2023-24329.json b/2023/CVE-2023-24329.json index fc1109f8f0..b6b4970a65 100644 --- a/2023/CVE-2023-24329.json +++ b/2023/CVE-2023-24329.json @@ -60,36 +60,5 @@ "watchers": 0, "score": 0, "subscribers_count": 0 - }, - { - "id": 795324648, - "name": "CVE-2023-24329-Exploit", - "full_name": "PenTestMano\/CVE-2023-24329-Exploit", - "owner": { - "login": "PenTestMano", - "id": 162714784, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/162714784?v=4", - "html_url": "https:\/\/github.com\/PenTestMano", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/PenTestMano\/CVE-2023-24329-Exploit", - "description": "Example of CVE-2023-24329 ", - "fork": false, - "created_at": "2024-05-03T03:16:02Z", - "updated_at": "2024-05-03T03:16:02Z", - "pushed_at": "2023-10-13T07:42:36Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-25136.json b/2023/CVE-2023-25136.json index f1c07e421b..5a84613736 100644 --- a/2023/CVE-2023-25136.json +++ b/2023/CVE-2023-25136.json @@ -321,6 +321,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-27163.json b/2023/CVE-2023-27163.json index 5fb03c9bde..d6bbb55ca7 100644 --- a/2023/CVE-2023-27163.json +++ b/2023/CVE-2023-27163.json @@ -417,68 +417,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 739001610, - "name": "CVE-2023-27163", - "full_name": "Rubioo02\/CVE-2023-27163", - "owner": { - "login": "Rubioo02", - "id": 153825296, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/153825296?v=4", - "html_url": "https:\/\/github.com\/Rubioo02", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Rubioo02\/CVE-2023-27163", - "description": "A exploit for the CVE-2023-27163 (SSRF) vulnerability in the web application request-baskets (<= v.1.2.1)", - "fork": false, - "created_at": "2024-01-04T14:46:13Z", - "updated_at": "2024-01-04T17:04:49Z", - "pushed_at": "2024-01-04T16:40:47Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 2 - }, - { - "id": 739760866, - "name": "CVE-2023-27163", - "full_name": "madhavmehndiratta\/CVE-2023-27163", - "owner": { - "login": "madhavmehndiratta", - "id": 43489174, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43489174?v=4", - "html_url": "https:\/\/github.com\/madhavmehndiratta", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/madhavmehndiratta\/CVE-2023-27163", - "description": "PoC for SSRF in request-baskets v1.2.1 (CVE-2023-27163)", - "fork": false, - "created_at": "2024-01-06T13:16:29Z", - "updated_at": "2024-01-06T15:53:16Z", - "pushed_at": "2024-01-06T15:52:11Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 820848497, "name": "CVE-2023-27163-ssrf-to-port-scanning", diff --git a/2023/CVE-2023-28252.json b/2023/CVE-2023-28252.json index 5d37e6e520..5662ee4c3f 100644 --- a/2023/CVE-2023-28252.json +++ b/2023/CVE-2023-28252.json @@ -92,37 +92,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 737810016, - "name": "Compiled-PoC-Binary-For-CVE-2023-28252", - "full_name": "bkstephen\/Compiled-PoC-Binary-For-CVE-2023-28252", - "owner": { - "login": "bkstephen", - "id": 8013595, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8013595?v=4", - "html_url": "https:\/\/github.com\/bkstephen", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/bkstephen\/Compiled-PoC-Binary-For-CVE-2023-28252", - "description": "The repo contains a precompiled binary which can be run on a Windows machine vulnerable to CVE-2023-28252", - "fork": false, - "created_at": "2024-01-01T15:30:33Z", - "updated_at": "2024-06-21T07:22:21Z", - "pushed_at": "2024-01-01T15:39:15Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - }, { "id": 746601760, "name": "CVE-2023-28252-Compiled-exe", diff --git a/2023/CVE-2023-28432.json b/2023/CVE-2023-28432.json index e02f18b6ec..edd15c3bdf 100644 --- a/2023/CVE-2023-28432.json +++ b/2023/CVE-2023-28432.json @@ -498,37 +498,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 740067240, - "name": "CVE-2023-28432", - "full_name": "netuseradministrator\/CVE-2023-28432", - "owner": { - "login": "netuseradministrator", - "id": 96680088, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96680088?v=4", - "html_url": "https:\/\/github.com\/netuseradministrator", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/netuseradministrator\/CVE-2023-28432", - "description": null, - "fork": false, - "created_at": "2024-01-07T12:34:49Z", - "updated_at": "2024-01-31T02:25:36Z", - "pushed_at": "2024-01-07T15:20:56Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, { "id": 741968176, "name": "CVE-2023-28432", diff --git a/2023/CVE-2023-29343.json b/2023/CVE-2023-29343.json index 8995d70366..90c26fd866 100644 --- a/2023/CVE-2023-29343.json +++ b/2023/CVE-2023-29343.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2023-06-18T11:14:08Z", - "updated_at": "2025-01-05T21:11:25Z", + "updated_at": "2025-01-17T05:28:03Z", "pushed_at": "2023-06-18T11:51:54Z", - "stargazers_count": 159, - "watchers_count": 159, + "stargazers_count": 160, + "watchers_count": 160, "has_discussions": false, "forks_count": 26, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 26, - "watchers": 159, + "watchers": 160, "score": 0, "subscribers_count": 4 } diff --git a/2023/CVE-2023-29357.json b/2023/CVE-2023-29357.json index b8e6a0c265..29235c0e98 100644 --- a/2023/CVE-2023-29357.json +++ b/2023/CVE-2023-29357.json @@ -130,37 +130,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 737886117, - "name": "CVE-2023-29357-Check", - "full_name": "Jev1337\/CVE-2023-29357-Check", - "owner": { - "login": "Jev1337", - "id": 19759761, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19759761?v=4", - "html_url": "https:\/\/github.com\/Jev1337", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Jev1337\/CVE-2023-29357-Check", - "description": "A Python script that verifies whether a target is vulnerable to CVE-2023-29357 or not", - "fork": false, - "created_at": "2024-01-01T21:08:22Z", - "updated_at": "2024-11-06T09:07:45Z", - "pushed_at": "2024-01-01T21:13:58Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 0 - }, { "id": 856513093, "name": "Event-ID-189-Rule-Name-SOC227-CVE-2023-29357", diff --git a/2023/CVE-2023-31446.json b/2023/CVE-2023-31446.json deleted file mode 100644 index dc8eeee6ac..0000000000 --- a/2023/CVE-2023-31446.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 739746679, - "name": "CVE-2023-31446-Remote-Code-Execution", - "full_name": "Dodge-MPTC\/CVE-2023-31446-Remote-Code-Execution", - "owner": { - "login": "Dodge-MPTC", - "id": 75072113, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75072113?v=4", - "html_url": "https:\/\/github.com\/Dodge-MPTC", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Dodge-MPTC\/CVE-2023-31446-Remote-Code-Execution", - "description": "Repository contains description for CVE-2023-31446", - "fork": false, - "created_at": "2024-01-06T12:23:50Z", - "updated_at": "2024-01-09T09:34:42Z", - "pushed_at": "2024-01-06T12:57:49Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 4, - "score": 0, - "subscribers_count": 0 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-32315.json b/2023/CVE-2023-32315.json index 0ece21866a..84d18ef1e2 100644 --- a/2023/CVE-2023-32315.json +++ b/2023/CVE-2023-32315.json @@ -45,10 +45,10 @@ "description": "rce", "fork": false, "created_at": "2023-06-14T09:43:31Z", - "updated_at": "2024-12-05T17:12:57Z", + "updated_at": "2025-01-17T05:54:15Z", "pushed_at": "2023-06-15T01:35:51Z", - "stargazers_count": 129, - "watchers_count": 129, + "stargazers_count": 132, + "watchers_count": 132, "has_discussions": false, "forks_count": 32, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 32, - "watchers": 129, + "watchers": 132, "score": 0, "subscribers_count": 5 }, diff --git a/2023/CVE-2023-34362.json b/2023/CVE-2023-34362.json index 0099e862ae..42dda24651 100644 --- a/2023/CVE-2023-34362.json +++ b/2023/CVE-2023-34362.json @@ -233,37 +233,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 737660313, - "name": "MOVEit-CVE-2023-34362", - "full_name": "Chinyemba-ck\/MOVEit-CVE-2023-34362", - "owner": { - "login": "Chinyemba-ck", - "id": 85675608, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85675608?v=4", - "html_url": "https:\/\/github.com\/Chinyemba-ck", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Chinyemba-ck\/MOVEit-CVE-2023-34362", - "description": "A video presentation analysing the technical details, scale and lessons to be learned from the MOVEit CVE-2023=3462(CS50 Introduction to Cyber Security Finale Project)", - "fork": false, - "created_at": "2024-01-01T00:55:07Z", - "updated_at": "2024-01-01T00:55:07Z", - "pushed_at": "2024-01-01T00:56:32Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 821497009, "name": "MoveIT-CVE-2023-34362-RCE", diff --git a/2023/CVE-2023-36874.json b/2023/CVE-2023-36874.json index 75b1e27874..06aafaf6cd 100644 --- a/2023/CVE-2023-36874.json +++ b/2023/CVE-2023-36874.json @@ -107,10 +107,10 @@ "description": "Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE", "fork": false, "created_at": "2023-08-24T22:24:34Z", - "updated_at": "2025-01-11T04:48:47Z", + "updated_at": "2025-01-17T05:19:14Z", "pushed_at": "2023-08-25T00:30:01Z", - "stargazers_count": 206, - "watchers_count": 206, + "stargazers_count": 207, + "watchers_count": 207, "has_discussions": false, "forks_count": 27, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 27, - "watchers": 206, + "watchers": 207, "score": 0, "subscribers_count": 5 } diff --git a/2023/CVE-2023-38408.json b/2023/CVE-2023-38408.json index a5f43ff6c8..ac78d01454 100644 --- a/2023/CVE-2023-38408.json +++ b/2023/CVE-2023-38408.json @@ -14,10 +14,10 @@ "description": "PoC for the recent critical vuln affecting OpenSSH versions < 9.3p2", "fork": false, "created_at": "2023-08-09T19:56:07Z", - "updated_at": "2025-01-05T23:48:35Z", + "updated_at": "2025-01-17T03:40:15Z", "pushed_at": "2024-11-09T16:38:20Z", - "stargazers_count": 35, - "watchers_count": 35, + "stargazers_count": 36, + "watchers_count": 36, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 35, + "watchers": 36, "score": 0, "subscribers_count": 1 }, @@ -67,37 +67,6 @@ "score": 0, "subscribers_count": 3 }, - { - "id": 739947067, - "name": "CVE-2023-38408", - "full_name": "classic130\/CVE-2023-38408", - "owner": { - "login": "classic130", - "id": 69665702, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69665702?v=4", - "html_url": "https:\/\/github.com\/classic130", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/classic130\/CVE-2023-38408", - "description": "CVE-2023-38408 Remote Code Execution in OpenSSH's forwarded ssh-agent", - "fork": false, - "created_at": "2024-01-07T03:03:06Z", - "updated_at": "2024-09-08T06:41:32Z", - "pushed_at": "2023-07-25T22:16:44Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 2, - "score": 0, - "subscribers_count": 0 - }, { "id": 758630242, "name": "CVE-2023-38408", diff --git a/2023/CVE-2023-38646.json b/2023/CVE-2023-38646.json index 7d6f474038..d29b2b9414 100644 --- a/2023/CVE-2023-38646.json +++ b/2023/CVE-2023-38646.json @@ -1099,37 +1099,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 767222866, - "name": "CVE-2023-38646", - "full_name": "DaniTheHack3r\/CVE-2023-38646", - "owner": { - "login": "DaniTheHack3r", - "id": 51076007, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51076007?v=4", - "html_url": "https:\/\/github.com\/DaniTheHack3r", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/DaniTheHack3r\/CVE-2023-38646", - "description": "CVE-2023-38646 Metabase 0.46.6 exploit", - "fork": false, - "created_at": "2024-03-04T23:01:43Z", - "updated_at": "2024-03-04T23:01:48Z", - "pushed_at": "2023-10-11T15:26:44Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 - }, { "id": 892415497, "name": "cve-2023-38646-poc", diff --git a/2023/CVE-2023-40084.json b/2023/CVE-2023-40084.json deleted file mode 100644 index 73b1bd5b58..0000000000 --- a/2023/CVE-2023-40084.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 739336852, - "name": "platform_system_netd_AOSP10_r33_CVE-2023-40084", - "full_name": "Trinadh465\/platform_system_netd_AOSP10_r33_CVE-2023-40084", - "owner": { - "login": "Trinadh465", - "id": 102574296, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4", - "html_url": "https:\/\/github.com\/Trinadh465", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Trinadh465\/platform_system_netd_AOSP10_r33_CVE-2023-40084", - "description": null, - "fork": false, - "created_at": "2024-01-05T10:20:57Z", - "updated_at": "2024-01-05T10:22:41Z", - "pushed_at": "2024-01-05T10:23:17Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index 9a2e55ca26..6934b0bcc6 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -14,10 +14,10 @@ "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "fork": false, "created_at": "2024-01-16T06:52:02Z", - "updated_at": "2025-01-15T20:51:33Z", + "updated_at": "2025-01-17T04:44:33Z", "pushed_at": "2024-08-18T08:26:46Z", - "stargazers_count": 1387, - "watchers_count": 1387, + "stargazers_count": 1389, + "watchers_count": 1389, "has_discussions": false, "forks_count": 238, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 238, - "watchers": 1387, + "watchers": 1389, "score": 0, "subscribers_count": 21 }, diff --git a/2023/CVE-2023-48981.json b/2023/CVE-2023-48981.json deleted file mode 100644 index 497aeac8af..0000000000 --- a/2023/CVE-2023-48981.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 737775658, - "name": "CVE-2023-48981", - "full_name": "tristao-marinho\/CVE-2023-48981", - "owner": { - "login": "tristao-marinho", - "id": 101610912, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101610912?v=4", - "html_url": "https:\/\/github.com\/tristao-marinho", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/tristao-marinho\/CVE-2023-48981", - "description": "POC CVE-2023-48981", - "fork": false, - "created_at": "2024-01-01T13:06:39Z", - "updated_at": "2024-01-01T13:06:40Z", - "pushed_at": "2024-01-01T13:18:39Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-48982.json b/2023/CVE-2023-48982.json deleted file mode 100644 index 17a1573e25..0000000000 --- a/2023/CVE-2023-48982.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 737777512, - "name": "CVE-2023-48982", - "full_name": "tristao-marinho\/CVE-2023-48982", - "owner": { - "login": "tristao-marinho", - "id": 101610912, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101610912?v=4", - "html_url": "https:\/\/github.com\/tristao-marinho", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/tristao-marinho\/CVE-2023-48982", - "description": "POC CVE-2023-48982", - "fork": false, - "created_at": "2024-01-01T13:14:49Z", - "updated_at": "2024-01-01T13:14:49Z", - "pushed_at": "2024-01-01T13:17:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-48983.json b/2023/CVE-2023-48983.json deleted file mode 100644 index 05adb7a92d..0000000000 --- a/2023/CVE-2023-48983.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 737778720, - "name": "CVE-2023-48983", - "full_name": "tristao-marinho\/CVE-2023-48983", - "owner": { - "login": "tristao-marinho", - "id": 101610912, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101610912?v=4", - "html_url": "https:\/\/github.com\/tristao-marinho", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/tristao-marinho\/CVE-2023-48983", - "description": "POC CVE-2023-48983", - "fork": false, - "created_at": "2024-01-01T13:19:54Z", - "updated_at": "2024-01-02T12:18:35Z", - "pushed_at": "2024-01-01T13:23:01Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-49070.json b/2023/CVE-2023-49070.json index 465a6aa408..a92559b663 100644 --- a/2023/CVE-2023-49070.json +++ b/2023/CVE-2023-49070.json @@ -103,37 +103,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 740289485, - "name": "Exploit-CVE-2023-49070-and-CVE-2023-51467-Apache-OFBiz", - "full_name": "UserConnecting\/Exploit-CVE-2023-49070-and-CVE-2023-51467-Apache-OFBiz", - "owner": { - "login": "UserConnecting", - "id": 97047842, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97047842?v=4", - "html_url": "https:\/\/github.com\/UserConnecting", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/UserConnecting\/Exploit-CVE-2023-49070-and-CVE-2023-51467-Apache-OFBiz", - "description": "Authentication Bypass Vulnerability Apache OFBiz < 18.12.10.", - "fork": false, - "created_at": "2024-01-08T03:13:43Z", - "updated_at": "2024-04-13T04:19:46Z", - "pushed_at": "2024-01-08T07:03:01Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 3, - "watchers": 4, - "score": 0, - "subscribers_count": 1 - }, { "id": 742169705, "name": "CVE-2023-49070_CVE-2023-51467", diff --git a/2023/CVE-2023-51073.json b/2023/CVE-2023-51073.json deleted file mode 100644 index 7d0b69f59b..0000000000 --- a/2023/CVE-2023-51073.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 739242348, - "name": "CVE-2023-51073", - "full_name": "christopher-pace\/CVE-2023-51073", - "owner": { - "login": "christopher-pace", - "id": 22531478, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22531478?v=4", - "html_url": "https:\/\/github.com\/christopher-pace", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/christopher-pace\/CVE-2023-51073", - "description": "Firmware Update Server Verification Vulnerability on Buffalo LS210D Version 1.78-0.03", - "fork": false, - "created_at": "2024-01-05T05:16:18Z", - "updated_at": "2024-01-07T02:12:37Z", - "pushed_at": "2024-01-07T01:40:37Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 2 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-51126.json b/2023/CVE-2023-51126.json deleted file mode 100644 index 76eac48c45..0000000000 --- a/2023/CVE-2023-51126.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 737937769, - "name": "CVE-2023-51126", - "full_name": "risuxx\/CVE-2023-51126", - "owner": { - "login": "risuxx", - "id": 47944560, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47944560?v=4", - "html_url": "https:\/\/github.com\/risuxx", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/risuxx\/CVE-2023-51126", - "description": null, - "fork": false, - "created_at": "2024-01-02T02:31:06Z", - "updated_at": "2024-01-03T14:30:50Z", - "pushed_at": "2024-01-02T02:38:11Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-51127.json b/2023/CVE-2023-51127.json deleted file mode 100644 index d9a17ee262..0000000000 --- a/2023/CVE-2023-51127.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 737940013, - "name": "CVE-2023-51127", - "full_name": "risuxx\/CVE-2023-51127", - "owner": { - "login": "risuxx", - "id": 47944560, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47944560?v=4", - "html_url": "https:\/\/github.com\/risuxx", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/risuxx\/CVE-2023-51127", - "description": null, - "fork": false, - "created_at": "2024-01-02T02:43:09Z", - "updated_at": "2024-01-03T14:30:37Z", - "pushed_at": "2024-01-02T02:46:58Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-51385.json b/2023/CVE-2023-51385.json index 0671dbb085..32f30a0a40 100644 --- a/2023/CVE-2023-51385.json +++ b/2023/CVE-2023-51385.json @@ -216,130 +216,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 737934166, - "name": "CVE-2023-51385", - "full_name": "WOOOOONG\/CVE-2023-51385", - "owner": { - "login": "WOOOOONG", - "id": 40143329, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40143329?v=4", - "html_url": "https:\/\/github.com\/WOOOOONG", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/WOOOOONG\/CVE-2023-51385", - "description": "CVE-2023-51385 PoC Exploit ", - "fork": false, - "created_at": "2024-01-02T02:12:35Z", - "updated_at": "2024-07-03T04:28:13Z", - "pushed_at": "2024-01-02T06:48:39Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 738402073, - "name": "CVE-2023-51385", - "full_name": "uccu99\/CVE-2023-51385", - "owner": { - "login": "uccu99", - "id": 155516921, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/155516921?v=4", - "html_url": "https:\/\/github.com\/uccu99", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/uccu99\/CVE-2023-51385", - "description": null, - "fork": false, - "created_at": "2024-01-03T06:28:34Z", - "updated_at": "2024-01-03T06:28:35Z", - "pushed_at": "2024-01-03T06:28:35Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 738661198, - "name": "exploit-CVE-2023-51385", - "full_name": "julienbrs\/exploit-CVE-2023-51385", - "owner": { - "login": "julienbrs", - "id": 106234742, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106234742?v=4", - "html_url": "https:\/\/github.com\/julienbrs", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/julienbrs\/exploit-CVE-2023-51385", - "description": null, - "fork": false, - "created_at": "2024-01-03T18:40:44Z", - "updated_at": "2024-01-03T18:40:44Z", - "pushed_at": "2024-01-03T18:41:24Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 738669696, - "name": "malicious-exploit-CVE-2023-51385", - "full_name": "julienbrs\/malicious-exploit-CVE-2023-51385", - "owner": { - "login": "julienbrs", - "id": 106234742, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106234742?v=4", - "html_url": "https:\/\/github.com\/julienbrs", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/julienbrs\/malicious-exploit-CVE-2023-51385", - "description": null, - "fork": false, - "created_at": "2024-01-03T19:08:28Z", - "updated_at": "2024-01-03T19:08:28Z", - "pushed_at": "2024-01-03T20:06:47Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 741050517, "name": "CVE-2023-51385", diff --git a/2023/CVE-2023-51467.json b/2023/CVE-2023-51467.json index 0360e3c0e3..57bd4fdf4d 100644 --- a/2023/CVE-2023-51467.json +++ b/2023/CVE-2023-51467.json @@ -144,68 +144,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 738955975, - "name": "Exploit_CVE-2023-51467", - "full_name": "Subha-BOO7\/Exploit_CVE-2023-51467", - "owner": { - "login": "Subha-BOO7", - "id": 141217634, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/141217634?v=4", - "html_url": "https:\/\/github.com\/Subha-BOO7", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Subha-BOO7\/Exploit_CVE-2023-51467", - "description": null, - "fork": false, - "created_at": "2024-01-04T12:44:43Z", - "updated_at": "2024-01-04T12:51:15Z", - "pushed_at": "2024-01-04T12:45:24Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 - }, - { - "id": 739631896, - "name": "CVE-2023-51467-Exploit", - "full_name": "JaneMandy\/CVE-2023-51467-Exploit", - "owner": { - "login": "JaneMandy", - "id": 36792635, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36792635?v=4", - "html_url": "https:\/\/github.com\/JaneMandy", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/JaneMandy\/CVE-2023-51467-Exploit", - "description": "Apache Ofbiz CVE-2023-51467 图形化漏洞利用工具", - "fork": false, - "created_at": "2024-01-06T04:07:07Z", - "updated_at": "2024-09-05T01:30:59Z", - "pushed_at": "2024-01-06T10:33:34Z", - "stargazers_count": 39, - "watchers_count": 39, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 39, - "score": 0, - "subscribers_count": 1 - }, { "id": 741082767, "name": "cve-2023-51467", diff --git a/2023/CVE-2023-51764.json b/2023/CVE-2023-51764.json index 911079b831..06527e9aa5 100644 --- a/2023/CVE-2023-51764.json +++ b/2023/CVE-2023-51764.json @@ -93,36 +93,5 @@ "watchers": 1, "score": 0, "subscribers_count": 1 - }, - { - "id": 739273926, - "name": "CVE-2023-51764", - "full_name": "Double-q1015\/CVE-2023-51764", - "owner": { - "login": "Double-q1015", - "id": 77765134, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77765134?v=4", - "html_url": "https:\/\/github.com\/Double-q1015", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Double-q1015\/CVE-2023-51764", - "description": "CVE-2023-51764 poc", - "fork": false, - "created_at": "2024-01-05T07:07:47Z", - "updated_at": "2024-01-05T07:12:42Z", - "pushed_at": "2024-01-05T07:12:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-7172.json b/2023/CVE-2023-7172.json deleted file mode 100644 index b8ca2b8fe6..0000000000 --- a/2023/CVE-2023-7172.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 738005679, - "name": "CVE-2023-7172", - "full_name": "sharathc213\/CVE-2023-7172", - "owner": { - "login": "sharathc213", - "id": 63504490, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63504490?v=4", - "html_url": "https:\/\/github.com\/sharathc213", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/sharathc213\/CVE-2023-7172", - "description": null, - "fork": false, - "created_at": "2024-01-02T07:28:25Z", - "updated_at": "2024-09-07T10:22:34Z", - "pushed_at": "2024-01-02T08:01:27Z", - "stargazers_count": 6, - "watchers_count": 6, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 6, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-7173.json b/2023/CVE-2023-7173.json deleted file mode 100644 index 3820055136..0000000000 --- a/2023/CVE-2023-7173.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 738027789, - "name": "CVE-2023-7173", - "full_name": "sharathc213\/CVE-2023-7173", - "owner": { - "login": "sharathc213", - "id": 63504490, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63504490?v=4", - "html_url": "https:\/\/github.com\/sharathc213", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/sharathc213\/CVE-2023-7173", - "description": null, - "fork": false, - "created_at": "2024-01-02T08:41:10Z", - "updated_at": "2024-09-07T10:22:32Z", - "pushed_at": "2024-01-02T08:55:56Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json index 2a48d80c7f..f079235f8f 100644 --- a/2024/CVE-2024-1086.json +++ b/2024/CVE-2024-1086.json @@ -14,10 +14,10 @@ "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.", "fork": false, "created_at": "2024-03-20T21:16:41Z", - "updated_at": "2025-01-16T09:39:37Z", + "updated_at": "2025-01-17T06:00:34Z", "pushed_at": "2024-04-17T16:09:54Z", - "stargazers_count": 2326, - "watchers_count": 2326, + "stargazers_count": 2327, + "watchers_count": 2327, "has_discussions": false, "forks_count": 302, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 302, - "watchers": 2326, + "watchers": 2327, "score": 0, "subscribers_count": 27 }, diff --git a/2024/CVE-2024-20656.json b/2024/CVE-2024-20656.json index 06bf9b8554..8ef534db93 100644 --- a/2024/CVE-2024-20656.json +++ b/2024/CVE-2024-20656.json @@ -14,19 +14,19 @@ "description": null, "fork": false, "created_at": "2024-01-12T15:08:01Z", - "updated_at": "2024-12-26T18:51:04Z", + "updated_at": "2025-01-17T05:17:42Z", "pushed_at": "2024-01-14T07:14:33Z", - "stargazers_count": 138, - "watchers_count": 138, + "stargazers_count": 139, + "watchers_count": 139, "has_discussions": false, - "forks_count": 30, + "forks_count": 31, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 30, - "watchers": 138, + "forks": 31, + "watchers": 139, "score": 0, "subscribers_count": 4 } diff --git a/2024/CVE-2024-30051.json b/2024/CVE-2024-30051.json index 3400337b39..c61e581c1c 100644 --- a/2024/CVE-2024-30051.json +++ b/2024/CVE-2024-30051.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2024-08-14T16:20:38Z", - "updated_at": "2025-01-09T11:58:18Z", + "updated_at": "2025-01-17T02:40:27Z", "pushed_at": "2024-09-05T23:21:00Z", - "stargazers_count": 114, - "watchers_count": 114, + "stargazers_count": 115, + "watchers_count": 115, "has_discussions": false, "forks_count": 33, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 33, - "watchers": 114, + "watchers": 115, "score": 0, "subscribers_count": 3 } diff --git a/2024/CVE-2024-43468.json b/2024/CVE-2024-43468.json index 09e9ec2a7d..9111e50034 100644 --- a/2024/CVE-2024-43468.json +++ b/2024/CVE-2024-43468.json @@ -14,19 +14,19 @@ "description": null, "fork": false, "created_at": "2024-11-26T12:39:44Z", - "updated_at": "2025-01-16T23:53:05Z", + "updated_at": "2025-01-17T05:12:02Z", "pushed_at": "2025-01-16T09:48:07Z", - "stargazers_count": 24, - "watchers_count": 24, + "stargazers_count": 29, + "watchers_count": 29, "has_discussions": false, - "forks_count": 2, + "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 2, - "watchers": 24, + "forks": 3, + "watchers": 29, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-44258.json b/2024/CVE-2024-44258.json index 82c5246b33..181a22cf66 100644 --- a/2024/CVE-2024-44258.json +++ b/2024/CVE-2024-44258.json @@ -14,10 +14,10 @@ "description": "CVE-2024-44258", "fork": false, "created_at": "2024-10-29T09:45:03Z", - "updated_at": "2024-12-23T03:15:29Z", + "updated_at": "2025-01-17T01:26:34Z", "pushed_at": "2024-11-02T19:20:44Z", - "stargazers_count": 61, - "watchers_count": 61, + "stargazers_count": 62, + "watchers_count": 62, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 8, - "watchers": 61, + "watchers": 62, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-49138.json b/2024/CVE-2024-49138.json index 4a405f005b..2fd77fbb73 100644 --- a/2024/CVE-2024-49138.json +++ b/2024/CVE-2024-49138.json @@ -14,12 +14,12 @@ "description": "POC exploit for CVE-2024-49138", "fork": false, "created_at": "2025-01-15T00:43:37Z", - "updated_at": "2025-01-16T20:52:56Z", + "updated_at": "2025-01-17T02:59:00Z", "pushed_at": "2025-01-15T01:01:21Z", - "stargazers_count": 136, - "watchers_count": 136, + "stargazers_count": 142, + "watchers_count": 142, "has_discussions": false, - "forks_count": 24, + "forks_count": 26, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -30,8 +30,8 @@ "windows" ], "visibility": "public", - "forks": 24, - "watchers": 136, + "forks": 26, + "watchers": 142, "score": 0, "subscribers_count": 2 } diff --git a/2024/CVE-2024-53691.json b/2024/CVE-2024-53691.json index b08adf3ed8..7038b22dda 100644 --- a/2024/CVE-2024-53691.json +++ b/2024/CVE-2024-53691.json @@ -14,19 +14,19 @@ "description": "CVE-2024-53691", "fork": false, "created_at": "2025-01-13T10:07:25Z", - "updated_at": "2025-01-15T16:00:00Z", + "updated_at": "2025-01-17T03:02:45Z", "pushed_at": "2025-01-13T10:16:58Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, - "watchers": 2, + "forks": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-55591.json b/2024/CVE-2024-55591.json index 21910a0bb1..0f65ed6cc9 100644 --- a/2024/CVE-2024-55591.json +++ b/2024/CVE-2024-55591.json @@ -14,19 +14,19 @@ "description": null, "fork": false, "created_at": "2025-01-16T07:26:15Z", - "updated_at": "2025-01-16T22:27:04Z", + "updated_at": "2025-01-17T02:26:36Z", "pushed_at": "2025-01-16T08:58:49Z", - "stargazers_count": 27, - "watchers_count": 27, + "stargazers_count": 30, + "watchers_count": 30, "has_discussions": false, - "forks_count": 6, + "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 6, - "watchers": 27, + "forks": 7, + "watchers": 30, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-57784.json b/2024/CVE-2024-57784.json new file mode 100644 index 0000000000..6db51f627d --- /dev/null +++ b/2024/CVE-2024-57784.json @@ -0,0 +1,33 @@ +[ + { + "id": 917637744, + "name": "CVE-2024-57784", + "full_name": "s4fv4n\/CVE-2024-57784", + "owner": { + "login": "s4fv4n", + "id": 42152758, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42152758?v=4", + "html_url": "https:\/\/github.com\/s4fv4n", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/s4fv4n\/CVE-2024-57784", + "description": null, + "fork": false, + "created_at": "2025-01-16T11:17:10Z", + "updated_at": "2025-01-17T04:32:46Z", + "pushed_at": "2025-01-16T11:19:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-57785.json b/2024/CVE-2024-57785.json new file mode 100644 index 0000000000..8ff86fc70a --- /dev/null +++ b/2024/CVE-2024-57785.json @@ -0,0 +1,33 @@ +[ + { + "id": 917634991, + "name": "CVE-2024-57785", + "full_name": "s4fv4n\/CVE-2024-57785", + "owner": { + "login": "s4fv4n", + "id": 42152758, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42152758?v=4", + "html_url": "https:\/\/github.com\/s4fv4n", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/s4fv4n\/CVE-2024-57785", + "description": null, + "fork": false, + "created_at": "2025-01-16T11:10:34Z", + "updated_at": "2025-01-17T04:32:13Z", + "pushed_at": "2025-01-16T11:19:56Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2025/CVE-2025-0282.json b/2025/CVE-2025-0282.json index a9c90372ef..58d781eb7b 100644 --- a/2025/CVE-2025-0282.json +++ b/2025/CVE-2025-0282.json @@ -138,10 +138,10 @@ "description": "Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)", "fork": false, "created_at": "2025-01-15T18:27:12Z", - "updated_at": "2025-01-17T00:29:43Z", + "updated_at": "2025-01-17T04:05:43Z", "pushed_at": "2025-01-16T15:44:15Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 11, + "watchers_count": 11, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -150,7 +150,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 5, + "watchers": 11, "score": 0, "subscribers_count": 0 }, @@ -169,10 +169,10 @@ "description": "PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gateways", "fork": false, "created_at": "2025-01-16T14:45:53Z", - "updated_at": "2025-01-16T20:11:13Z", + "updated_at": "2025-01-17T05:55:41Z", "pushed_at": "2025-01-16T20:09:52Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 13, + "watchers_count": 13, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -181,7 +181,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 5, + "watchers": 13, "score": 0, "subscribers_count": 0 } diff --git a/README.md b/README.md index 16f23ea61d..dea48e49a7 100644 --- a/README.md +++ b/README.md @@ -8488,6 +8488,20 @@ ### CVE-2024-57523 - [HackWidMaddy/CVE-2024-57523.](https://github.com/HackWidMaddy/CVE-2024-57523.) +### CVE-2024-57784 (2025-01-16) + +An issue in the component /php/script_uploads.php of Zenitel AlphaWeb XE v11.2.3.10 allows attackers to execute a directory traversal. + + +- [s4fv4n/CVE-2024-57784](https://github.com/s4fv4n/CVE-2024-57784) + +### CVE-2024-57785 (2025-01-16) + +Zenitel AlphaWeb XE v11.2.3.10 was discovered to contain a local file inclusion vulnerability via the component amc_uploads.php. + + +- [s4fv4n/CVE-2024-57785](https://github.com/s4fv4n/CVE-2024-57785) + ### CVE-2024-1642470 - [Symbolexe/CVE-2024-1642470](https://github.com/Symbolexe/CVE-2024-1642470) @@ -10067,20 +10081,6 @@ - [soltanali0/CVE-2023-7028](https://github.com/soltanali0/CVE-2023-7028) - [gh-ost00/CVE-2023-7028](https://github.com/gh-ost00/CVE-2023-7028) -### CVE-2023-7172 (2023-12-30) - -Eine kritische Schwachstelle wurde in PHPGurukul Hospital Management System 1.0 entdeckt. Es geht hierbei um eine nicht näher spezifizierte Funktion der Komponente Admin Dashboard. Durch Manipulieren mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung. - - -- [sharathc213/CVE-2023-7172](https://github.com/sharathc213/CVE-2023-7172) - -### CVE-2023-7173 (2023-12-30) - -Es wurde eine problematische Schwachstelle in PHPGurukul Hospital Management System 1.0 gefunden. Es geht dabei um eine nicht klar definierte Funktion der Datei registration.php. Durch das Beeinflussen des Arguments First Name mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung. - - -- [sharathc213/CVE-2023-7173](https://github.com/sharathc213/CVE-2023-7173) - ### CVE-2023-7261 (2024-06-07) Inappropriate implementation in Google Updator prior to 1.3.36.351 in Google Chrome allowed a local attacker to perform privilege escalation via a malicious file. (Chromium security severity: High) @@ -10677,7 +10677,6 @@ - [aaaademo/Confluence-EvilJar](https://github.com/aaaademo/Confluence-EvilJar) - [edsonjt81/CVE-2023-22515-Scan.](https://github.com/edsonjt81/CVE-2023-22515-Scan.) - [INTfinityConsulting/cve-2023-22515](https://github.com/INTfinityConsulting/cve-2023-22515) -- [CalegariMindSec/Exploit-CVE-2023-22515](https://github.com/CalegariMindSec/Exploit-CVE-2023-22515) - [rxerium/CVE-2023-22515](https://github.com/rxerium/CVE-2023-22515) - [fyx1t/NSE--CVE-2023-22515](https://github.com/fyx1t/NSE--CVE-2023-22515) - [s1d6point7bugcrowd/CVE-2023-22515-check](https://github.com/s1d6point7bugcrowd/CVE-2023-22515-check) @@ -11092,7 +11091,6 @@ - [H4R335HR/CVE-2023-24329-PoC](https://github.com/H4R335HR/CVE-2023-24329-PoC) - [Pandante-Central/CVE-2023-24329-codeql-test](https://github.com/Pandante-Central/CVE-2023-24329-codeql-test) -- [PenTestMano/CVE-2023-24329-Exploit](https://github.com/PenTestMano/CVE-2023-24329-Exploit) ### CVE-2023-24488 (2023-07-10) @@ -11535,8 +11533,6 @@ - [Hamibubu/CVE-2023-27163](https://github.com/Hamibubu/CVE-2023-27163) - [KharimMchatta/basketcraft](https://github.com/KharimMchatta/basketcraft) - [MasterCode112/CVE-2023-27163](https://github.com/MasterCode112/CVE-2023-27163) -- [Rubioo02/CVE-2023-27163](https://github.com/Rubioo02/CVE-2023-27163) -- [madhavmehndiratta/CVE-2023-27163](https://github.com/madhavmehndiratta/CVE-2023-27163) - [Rishabh-Kumar-Cyber-Sec/CVE-2023-27163-ssrf-to-port-scanning](https://github.com/Rishabh-Kumar-Cyber-Sec/CVE-2023-27163-ssrf-to-port-scanning) - [btar1gan/exploit_CVE-2023-27163](https://github.com/btar1gan/exploit_CVE-2023-27163) @@ -11776,7 +11772,6 @@ - [fortra/CVE-2023-28252](https://github.com/fortra/CVE-2023-28252) - [726232111/CVE-2023-28252](https://github.com/726232111/CVE-2023-28252) - [Danasuley/CVE-2023-28252-](https://github.com/Danasuley/CVE-2023-28252-) -- [bkstephen/Compiled-PoC-Binary-For-CVE-2023-28252](https://github.com/bkstephen/Compiled-PoC-Binary-For-CVE-2023-28252) - [duck-sec/CVE-2023-28252-Compiled-exe](https://github.com/duck-sec/CVE-2023-28252-Compiled-exe) - [byt3n33dl3/CLFS](https://github.com/byt3n33dl3/CLFS) - [Vulmatch/CVE-2023-28252](https://github.com/Vulmatch/CVE-2023-28252) @@ -11846,7 +11841,6 @@ - [yTxZx/CVE-2023-28432](https://github.com/yTxZx/CVE-2023-28432) - [unam4/CVE-2023-28432-minio_update_rce](https://github.com/unam4/CVE-2023-28432-minio_update_rce) - [C1ph3rX13/CVE-2023-28432](https://github.com/C1ph3rX13/CVE-2023-28432) -- [netuseradministrator/CVE-2023-28432](https://github.com/netuseradministrator/CVE-2023-28432) - [xk-mt/CVE-2023-28432](https://github.com/xk-mt/CVE-2023-28432) - [0xRulez/CVE-2023-28432](https://github.com/0xRulez/CVE-2023-28432) @@ -11967,7 +11961,6 @@ - [LuemmelSec/CVE-2023-29357](https://github.com/LuemmelSec/CVE-2023-29357) - [KeyStrOke95/CVE-2023-29357-ExE](https://github.com/KeyStrOke95/CVE-2023-29357-ExE) - [Guillaume-Risch/cve-2023-29357-Sharepoint](https://github.com/Guillaume-Risch/cve-2023-29357-Sharepoint) -- [Jev1337/CVE-2023-29357-Check](https://github.com/Jev1337/CVE-2023-29357-Check) - [AhmedMansour93/Event-ID-189-Rule-Name-SOC227-CVE-2023-29357](https://github.com/AhmedMansour93/Event-ID-189-Rule-Name-SOC227-CVE-2023-29357) ### CVE-2023-29360 (2023-06-13) @@ -12376,13 +12369,6 @@ - [Dodge-MPTC/CVE-2023-31445-Unprivileged-Information-Disclosure](https://github.com/Dodge-MPTC/CVE-2023-31445-Unprivileged-Information-Disclosure) -### CVE-2023-31446 (2024-01-10) - -In Cassia Gateway firmware XC1000_2.1.1.2303082218 and XC2000_2.1.1.2303090947, the queueUrl parameter in /bypass/config is not sanitized. This leads to injecting Bash code and executing it with root privileges on device startup. - - -- [Dodge-MPTC/CVE-2023-31446-Remote-Code-Execution](https://github.com/Dodge-MPTC/CVE-2023-31446-Remote-Code-Execution) - ### CVE-2023-31497 (2023-05-11) Incorrect access control in Quick Heal Technologies Limited Seqrite Endpoint Security (EPS) all versions prior to v8.0 allows attackers to escalate privileges to root via supplying a crafted binary to the target system. @@ -13149,7 +13135,6 @@ - [Malwareman007/CVE-2023-34362](https://github.com/Malwareman007/CVE-2023-34362) - [toorandom/moveit-payload-decrypt-CVE-2023-34362](https://github.com/toorandom/moveit-payload-decrypt-CVE-2023-34362) - [errorfiathck/MOVEit-Exploit](https://github.com/errorfiathck/MOVEit-Exploit) -- [Chinyemba-ck/MOVEit-CVE-2023-34362](https://github.com/Chinyemba-ck/MOVEit-CVE-2023-34362) - [glen-pearson/MoveIT-CVE-2023-34362-RCE](https://github.com/glen-pearson/MoveIT-CVE-2023-34362-RCE) - [aditibv/MOVEit-CVE-2023-34362](https://github.com/aditibv/MOVEit-CVE-2023-34362) @@ -14006,7 +13991,6 @@ - [kali-mx/CVE-2023-38408](https://github.com/kali-mx/CVE-2023-38408) - [LucasPDiniz/CVE-2023-38408](https://github.com/LucasPDiniz/CVE-2023-38408) -- [classic130/CVE-2023-38408](https://github.com/classic130/CVE-2023-38408) - [wxrdnx/CVE-2023-38408](https://github.com/wxrdnx/CVE-2023-38408) - [mrtacojr/CVE-2023-38408](https://github.com/mrtacojr/CVE-2023-38408) - [fazilbaig1/cve_2023_38408_scanner](https://github.com/fazilbaig1/cve_2023_38408_scanner) @@ -14117,7 +14101,6 @@ - [Shisones/MetabaseRCE_CVE-2023-38646](https://github.com/Shisones/MetabaseRCE_CVE-2023-38646) - [acesoyeo/METABASE-RCE-CVE-2023-38646-](https://github.com/acesoyeo/METABASE-RCE-CVE-2023-38646-) - [UserConnecting/Exploit-CVE-2023-38646-Metabase](https://github.com/UserConnecting/Exploit-CVE-2023-38646-Metabase) -- [DaniTheHack3r/CVE-2023-38646](https://github.com/DaniTheHack3r/CVE-2023-38646) - [XiaomingX/cve-2023-38646-poc](https://github.com/XiaomingX/cve-2023-38646-poc) - [JayRyz/CVE-2023-38646-PoC-Metabase](https://github.com/JayRyz/CVE-2023-38646-PoC-Metabase) @@ -14413,13 +14396,6 @@ - [kenbuckler/WS_FTP-CVE-2023-40044](https://github.com/kenbuckler/WS_FTP-CVE-2023-40044) -### CVE-2023-40084 (2023-12-04) - -In run of MDnsSdListener.cpp, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. - - -- [Trinadh465/platform_system_netd_AOSP10_r33_CVE-2023-40084](https://github.com/Trinadh465/platform_system_netd_AOSP10_r33_CVE-2023-40084) - ### CVE-2023-40109 (2024-02-15) In createFromParcel of UsbConfiguration.java, there is a possible background activity launch (BAL) due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. @@ -16328,15 +16304,6 @@ - [vinnie1717/CVE-2023-48974](https://github.com/vinnie1717/CVE-2023-48974) -### CVE-2023-48981 -- [tristao-marinho/CVE-2023-48981](https://github.com/tristao-marinho/CVE-2023-48981) - -### CVE-2023-48982 -- [tristao-marinho/CVE-2023-48982](https://github.com/tristao-marinho/CVE-2023-48982) - -### CVE-2023-48983 -- [tristao-marinho/CVE-2023-48983](https://github.com/tristao-marinho/CVE-2023-48983) - ### CVE-2023-49002 (2023-12-27) An issue in Xenom Technologies (sinous) Phone Dialer-voice Call Dialer v.1.2.5 allows an attacker to bypass intended access restrictions via interaction with com.funprime.calldialer.ui.activities.OutgoingActivity. @@ -16373,7 +16340,6 @@ - [abdoghazy2015/ofbiz-CVE-2023-49070-RCE-POC](https://github.com/abdoghazy2015/ofbiz-CVE-2023-49070-RCE-POC) - [0xrobiul/CVE-2023-49070](https://github.com/0xrobiul/CVE-2023-49070) - [D0g3-8Bit/OFBiz-Attack](https://github.com/D0g3-8Bit/OFBiz-Attack) -- [UserConnecting/Exploit-CVE-2023-49070-and-CVE-2023-51467-Apache-OFBiz](https://github.com/UserConnecting/Exploit-CVE-2023-49070-and-CVE-2023-51467-Apache-OFBiz) - [yukselberkay/CVE-2023-49070_CVE-2023-51467](https://github.com/yukselberkay/CVE-2023-49070_CVE-2023-51467) - [Praison001/Apache-OFBiz-Auth-Bypass-and-RCE-Exploit-CVE-2023-49070-CVE-2023-51467](https://github.com/Praison001/Apache-OFBiz-Auth-Bypass-and-RCE-Exploit-CVE-2023-49070-CVE-2023-51467) @@ -16828,30 +16794,9 @@ ### CVE-2023-51000 - [Team-Byerus/CVE-2023-51000](https://github.com/Team-Byerus/CVE-2023-51000) -### CVE-2023-51073 (2024-01-11) - -An issue in Buffalo LS210D v.1.78-0.03 allows a remote attacker to execute arbitrary code via the Firmware Update Script at /etc/init.d/update_notifications.sh. - - -- [christopher-pace/CVE-2023-51073](https://github.com/christopher-pace/CVE-2023-51073) - ### CVE-2023-51119 - [OscarAkaElvis/CVE-2023-51119](https://github.com/OscarAkaElvis/CVE-2023-51119) -### CVE-2023-51126 (2024-01-10) - -Command injection vulnerability in /usr/www/res.php in FLIR AX8 up to 1.46.16 allows attackers to run arbitrary commands via the value parameter. - - -- [risuxx/CVE-2023-51126](https://github.com/risuxx/CVE-2023-51126) - -### CVE-2023-51127 (2024-01-10) - -FLIR AX8 thermal sensor cameras up to and including 1.46.16 are vulnerable to Directory Traversal due to improper access restriction. This vulnerability allows an unauthenticated, remote attacker to obtain arbitrary sensitive file contents by uploading a specially crafted symbolic link file. - - -- [risuxx/CVE-2023-51127](https://github.com/risuxx/CVE-2023-51127) - ### CVE-2023-51214 - [chandraprarikraj/CVE-2023-51214](https://github.com/chandraprarikraj/CVE-2023-51214) @@ -16874,10 +16819,6 @@ - [LtmThink/CVE-2023-51385_test](https://github.com/LtmThink/CVE-2023-51385_test) - [WLaoDuo/CVE-2023-51385_poc-test](https://github.com/WLaoDuo/CVE-2023-51385_poc-test) - [power1314520/CVE-2023-51385_test](https://github.com/power1314520/CVE-2023-51385_test) -- [WOOOOONG/CVE-2023-51385](https://github.com/WOOOOONG/CVE-2023-51385) -- [uccu99/CVE-2023-51385](https://github.com/uccu99/CVE-2023-51385) -- [julienbrs/exploit-CVE-2023-51385](https://github.com/julienbrs/exploit-CVE-2023-51385) -- [julienbrs/malicious-exploit-CVE-2023-51385](https://github.com/julienbrs/malicious-exploit-CVE-2023-51385) - [Sonicrrrr/CVE-2023-51385](https://github.com/Sonicrrrr/CVE-2023-51385) - [farliy-hacker/CVE-2023-51385](https://github.com/farliy-hacker/CVE-2023-51385) - [farliy-hacker/CVE-2023-51385-save](https://github.com/farliy-hacker/CVE-2023-51385-save) @@ -16914,8 +16855,6 @@ - [Chocapikk/CVE-2023-51467](https://github.com/Chocapikk/CVE-2023-51467) - [K3ysTr0K3R/CVE-2023-51467-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2023-51467-EXPLOIT) - [jakabakos/Apache-OFBiz-Authentication-Bypass](https://github.com/jakabakos/Apache-OFBiz-Authentication-Bypass) -- [Subha-BOO7/Exploit_CVE-2023-51467](https://github.com/Subha-BOO7/Exploit_CVE-2023-51467) -- [JaneMandy/CVE-2023-51467-Exploit](https://github.com/JaneMandy/CVE-2023-51467-Exploit) - [vulncheck-oss/cve-2023-51467](https://github.com/vulncheck-oss/cve-2023-51467) - [2ptr/BadBizness-CVE-2023-51467](https://github.com/2ptr/BadBizness-CVE-2023-51467) - [AhmedMansour93/Event-ID-217-Rule-Name-SOC254-Apache-OFBiz-Auth-Bypass-and-Code-Injection-0Day-CVE-2023-51467-](https://github.com/AhmedMansour93/Event-ID-217-Rule-Name-SOC254-Apache-OFBiz-Auth-Bypass-and-Code-Injection-0Day-CVE-2023-51467-) @@ -16942,7 +16881,6 @@ - [duy-31/CVE-2023-51764](https://github.com/duy-31/CVE-2023-51764) - [eeenvik1/CVE-2023-51764](https://github.com/eeenvik1/CVE-2023-51764) - [d4op/CVE-2023-51764-POC](https://github.com/d4op/CVE-2023-51764-POC) -- [Double-q1015/CVE-2023-51764](https://github.com/Double-q1015/CVE-2023-51764) ### CVE-2023-51800 (2024-02-29)