From 5228f6412d704e760ece77f8b23a71fd97c8af0b Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Sun, 29 Dec 2024 03:31:49 +0900 Subject: [PATCH] Auto Update 2024/12/28 18:31:49 --- 2002/CVE-2002-20001.json | 8 +- 2014/CVE-2014-4210.json | 2 +- 2016/CVE-2016-0638.json | 2 +- 2017/CVE-2017-12615.json | 8 +- 2017/CVE-2017-12617.json | 8 +- 2017/CVE-2017-3248.json | 2 +- 2018/CVE-2018-15473.json | 8 +- 2018/CVE-2018-2628.json | 2 +- 2018/CVE-2018-5955.json | 8 +- 2019/CVE-2019-17558.json | 2 +- 2019/CVE-2019-2618.json | 2 +- 2019/CVE-2019-2725.json | 8 +- 2020/CVE-2020-11651.json | 8 +- 2020/CVE-2020-14882.json | 18 +- 2020/CVE-2020-2551.json | 2 +- 2021/CVE-2021-3156.json | 8 +- 2021/CVE-2021-4045.json | 8 +- 2021/CVE-2021-43908.json | 8 +- 2021/CVE-2021-44228.json | 24 +-- 2023/CVE-2023-1698.json | 31 ---- 2023/CVE-2023-20198.json | 155 ----------------- 2023/CVE-2023-20887.json | 8 +- 2023/CVE-2023-20918.json | 64 ------- 2023/CVE-2023-21238.json | 33 ---- 2023/CVE-2023-21246.json | 33 ---- 2023/CVE-2023-21251.json | 33 ---- 2023/CVE-2023-21272.json | 31 ---- 2023/CVE-2023-21275.json | 33 ---- 2023/CVE-2023-21281.json | 33 ---- 2023/CVE-2023-21282.json | 31 ---- 2023/CVE-2023-21284.json | 33 ---- 2023/CVE-2023-21286.json | 33 ---- 2023/CVE-2023-21288.json | 33 ---- 2023/CVE-2023-21768.json | 31 ---- 2023/CVE-2023-2215.json | 33 ---- 2023/CVE-2023-22515.json | 226 ------------------------ 2023/CVE-2023-22855.json | 33 ---- 2023/CVE-2023-24517.json | 33 ---- 2023/CVE-2023-2640.json | 31 ---- 2023/CVE-2023-27363.json | 31 ---- 2023/CVE-2023-27524.json | 31 ---- 2023/CVE-2023-27997.json | 62 ------- 2023/CVE-2023-28252.json | 8 +- 2023/CVE-2023-28329.json | 33 ---- 2023/CVE-2023-28330.json | 33 ---- 2023/CVE-2023-2928.json | 33 ---- 2023/CVE-2023-29357.json | 31 ---- 2023/CVE-2023-29489.json | 31 ---- 2023/CVE-2023-29922.json | 33 ---- 2023/CVE-2023-31419.json | 31 ---- 2023/CVE-2023-32315.json | 31 ---- 2023/CVE-2023-32784.json | 31 ---- 2023/CVE-2023-33517.json | 33 ---- 2023/CVE-2023-36076.json | 33 ---- 2023/CVE-2023-36802.json | 31 ---- 2023/CVE-2023-36845.json | 62 ------- 2023/CVE-2023-38545.json | 186 -------------------- 2023/CVE-2023-38646.json | 284 ------------------------------ 2023/CVE-2023-38743.json | 33 ---- 2023/CVE-2023-38829.json | 6 +- 2023/CVE-2023-38831.json | 31 ---- 2023/CVE-2023-40044.json | 33 ---- 2023/CVE-2023-40361.json | 33 ---- 2023/CVE-2023-40429.json | 33 ---- 2023/CVE-2023-4169.json | 33 ---- 2023/CVE-2023-41892.json | 31 ---- 2023/CVE-2023-41993.json | 31 ---- 2023/CVE-2023-42793.json | 31 ---- 2023/CVE-2023-42820.json | 31 ---- 2023/CVE-2023-43144.json | 33 ---- 2023/CVE-2023-43147.json | 33 ---- 2023/CVE-2023-43149.json | 33 ---- 2023/CVE-2023-43284.json | 33 ---- 2023/CVE-2023-43838.json | 33 ---- 2023/CVE-2023-44487.json | 142 --------------- 2023/CVE-2023-44961.json | 33 ---- 2023/CVE-2023-44962.json | 33 ---- 2023/CVE-2023-45471.json | 33 ---- 2023/CVE-2023-45828.json | 33 ---- 2023/CVE-2023-45857.json | 31 ---- 2023/CVE-2023-45866.json | 2 +- 2023/CVE-2023-45966.json | 33 ---- 2023/CVE-2023-45992.json | 33 ---- 2023/CVE-2023-46003.json | 33 ---- 2023/CVE-2023-4863.json | 39 +---- 2023/CVE-2023-4911.json | 252 --------------------------- 2023/CVE-2023-50465.json | 33 ---- 2023/CVE-2023-5070.json | 33 ---- 2023/CVE-2023-5142.json | 33 ---- 2023/CVE-2023-5217.json | 95 ---------- 2023/CVE-2023-5521.json | 33 ---- 2023/CVE-2023-5538.json | 33 ---- 2023/CVE-2023-5539.json | 33 ---- 2023/CVE-2023-5540.json | 33 ---- 2023/CVE-2023-6319.json | 8 +- 2024/CVE-2024-11972.json | 4 +- 2024/CVE-2024-20137.json | 8 +- 2024/CVE-2024-20356.json | 8 +- 2024/CVE-2024-21762.json | 8 +- 2024/CVE-2024-27956.json | 8 +- 2024/CVE-2024-2961.json | 4 +- 2024/CVE-2024-30051.json | 8 +- 2024/CVE-2024-3094.json | 8 +- 2024/CVE-2024-38077.json | 8 +- 2024/CVE-2024-40711.json | 8 +- 2024/CVE-2024-44193.json | 8 +- 2024/CVE-2024-4883.json | 8 +- 2024/CVE-2024-4885.json | 8 +- 2024/CVE-2024-48990.json | 8 +- 2024/CVE-2024-5009.json | 8 +- 2024/CVE-2024-50379.json | 12 +- 2024/CVE-2024-6387.json | 4 +- 2024/CVE-2024-6670.json | 8 +- 2024/CVE-2024-8069.json | 8 +- README.md | 363 --------------------------------------- 115 files changed, 160 insertions(+), 4024 deletions(-) delete mode 100644 2023/CVE-2023-20918.json delete mode 100644 2023/CVE-2023-21238.json delete mode 100644 2023/CVE-2023-21246.json delete mode 100644 2023/CVE-2023-21251.json delete mode 100644 2023/CVE-2023-21275.json delete mode 100644 2023/CVE-2023-21281.json delete mode 100644 2023/CVE-2023-21284.json delete mode 100644 2023/CVE-2023-21286.json delete mode 100644 2023/CVE-2023-21288.json delete mode 100644 2023/CVE-2023-2215.json delete mode 100644 2023/CVE-2023-22855.json delete mode 100644 2023/CVE-2023-24517.json delete mode 100644 2023/CVE-2023-28329.json delete mode 100644 2023/CVE-2023-28330.json delete mode 100644 2023/CVE-2023-2928.json delete mode 100644 2023/CVE-2023-29922.json delete mode 100644 2023/CVE-2023-33517.json delete mode 100644 2023/CVE-2023-36076.json delete mode 100644 2023/CVE-2023-38743.json delete mode 100644 2023/CVE-2023-40044.json delete mode 100644 2023/CVE-2023-40361.json delete mode 100644 2023/CVE-2023-40429.json delete mode 100644 2023/CVE-2023-4169.json delete mode 100644 2023/CVE-2023-43144.json delete mode 100644 2023/CVE-2023-43147.json delete mode 100644 2023/CVE-2023-43149.json delete mode 100644 2023/CVE-2023-43284.json delete mode 100644 2023/CVE-2023-43838.json delete mode 100644 2023/CVE-2023-44961.json delete mode 100644 2023/CVE-2023-44962.json delete mode 100644 2023/CVE-2023-45471.json delete mode 100644 2023/CVE-2023-45828.json delete mode 100644 2023/CVE-2023-45966.json delete mode 100644 2023/CVE-2023-45992.json delete mode 100644 2023/CVE-2023-46003.json delete mode 100644 2023/CVE-2023-50465.json delete mode 100644 2023/CVE-2023-5070.json delete mode 100644 2023/CVE-2023-5142.json delete mode 100644 2023/CVE-2023-5217.json delete mode 100644 2023/CVE-2023-5521.json delete mode 100644 2023/CVE-2023-5538.json delete mode 100644 2023/CVE-2023-5539.json delete mode 100644 2023/CVE-2023-5540.json diff --git a/2002/CVE-2002-20001.json b/2002/CVE-2002-20001.json index 9a079d185f..1a81912c51 100644 --- a/2002/CVE-2002-20001.json +++ b/2002/CVE-2002-20001.json @@ -14,10 +14,10 @@ "description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)", "fork": false, "created_at": "2021-08-31T09:51:12Z", - "updated_at": "2024-12-26T06:26:35Z", + "updated_at": "2024-12-28T14:58:33Z", "pushed_at": "2024-05-03T22:24:07Z", - "stargazers_count": 186, - "watchers_count": 186, + "stargazers_count": 187, + "watchers_count": 187, "has_discussions": false, "forks_count": 26, "allow_forking": true, @@ -47,7 +47,7 @@ ], "visibility": "public", "forks": 26, - "watchers": 186, + "watchers": 187, "score": 0, "subscribers_count": 8 } diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index dffddc1907..9e6a0602b6 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -45,7 +45,7 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-12-22T08:19:25Z", + "updated_at": "2024-12-28T15:02:24Z", "pushed_at": "2023-11-24T09:21:56Z", "stargazers_count": 2014, "watchers_count": 2014, diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 93e6c3d5ba..4b0b36b6cf 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -14,7 +14,7 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-12-22T08:19:25Z", + "updated_at": "2024-12-28T15:02:24Z", "pushed_at": "2023-11-24T09:21:56Z", "stargazers_count": 2014, "watchers_count": 2014, diff --git a/2017/CVE-2017-12615.json b/2017/CVE-2017-12615.json index 5932467cb0..b25f510598 100644 --- a/2017/CVE-2017-12615.json +++ b/2017/CVE-2017-12615.json @@ -14,10 +14,10 @@ "description": "POC Exploit for Apache Tomcat 7.0.x CVE-2017-12615 PUT JSP vulnerability.", "fork": false, "created_at": "2017-09-23T06:15:48Z", - "updated_at": "2024-12-07T12:00:39Z", + "updated_at": "2024-12-28T12:55:28Z", "pushed_at": "2022-10-09T12:13:03Z", - "stargazers_count": 113, - "watchers_count": 113, + "stargazers_count": 112, + "watchers_count": 112, "has_discussions": false, "forks_count": 24, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 24, - "watchers": 113, + "watchers": 112, "score": 0, "subscribers_count": 5 }, diff --git a/2017/CVE-2017-12617.json b/2017/CVE-2017-12617.json index 9b492ce4a1..0e4cd1b627 100644 --- a/2017/CVE-2017-12617.json +++ b/2017/CVE-2017-12617.json @@ -14,10 +14,10 @@ "description": "Apache Tomcat < 9.0.1 (Beta) \/ < 8.5.23 \/ < 8.0.47 \/ < 7.0.8 - JSP Upload Bypass \/ Remote Code Execution ", "fork": false, "created_at": "2017-10-05T23:41:52Z", - "updated_at": "2024-12-09T01:43:49Z", + "updated_at": "2024-12-28T12:55:27Z", "pushed_at": "2017-10-11T07:43:50Z", - "stargazers_count": 392, - "watchers_count": 392, + "stargazers_count": 391, + "watchers_count": 391, "has_discussions": false, "forks_count": 122, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 122, - "watchers": 392, + "watchers": 391, "score": 0, "subscribers_count": 14 }, diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 7b405cbb4f..defbe509ab 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -45,7 +45,7 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-12-22T08:19:25Z", + "updated_at": "2024-12-28T15:02:24Z", "pushed_at": "2023-11-24T09:21:56Z", "stargazers_count": 2014, "watchers_count": 2014, diff --git a/2018/CVE-2018-15473.json b/2018/CVE-2018-15473.json index 3077507735..c4c2b80233 100644 --- a/2018/CVE-2018-15473.json +++ b/2018/CVE-2018-15473.json @@ -596,10 +596,10 @@ "description": "OpenSSH 2.3 < 7.7 - Username Enumeration", "fork": false, "created_at": "2020-11-29T17:36:11Z", - "updated_at": "2024-12-04T16:01:30Z", + "updated_at": "2024-12-28T13:11:39Z", "pushed_at": "2023-09-04T20:57:42Z", - "stargazers_count": 41, - "watchers_count": 41, + "stargazers_count": 40, + "watchers_count": 40, "has_discussions": false, "forks_count": 12, "allow_forking": true, @@ -608,7 +608,7 @@ "topics": [], "visibility": "public", "forks": 12, - "watchers": 41, + "watchers": 40, "score": 0, "subscribers_count": 3 }, diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 3ddba2f74a..5e23e00687 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -576,7 +576,7 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-12-22T08:19:25Z", + "updated_at": "2024-12-28T15:02:24Z", "pushed_at": "2023-11-24T09:21:56Z", "stargazers_count": 2014, "watchers_count": 2014, diff --git a/2018/CVE-2018-5955.json b/2018/CVE-2018-5955.json index 1c09a2a661..12cb4ff8ea 100644 --- a/2018/CVE-2018-5955.json +++ b/2018/CVE-2018-5955.json @@ -45,10 +45,10 @@ "description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能", "fork": false, "created_at": "2019-12-21T22:45:55Z", - "updated_at": "2024-11-29T03:20:33Z", + "updated_at": "2024-12-28T12:58:43Z", "pushed_at": "2020-01-05T21:46:25Z", - "stargazers_count": 649, - "watchers_count": 649, + "stargazers_count": 648, + "watchers_count": 648, "has_discussions": false, "forks_count": 128, "allow_forking": true, @@ -70,7 +70,7 @@ ], "visibility": "public", "forks": 128, - "watchers": 649, + "watchers": 648, "score": 0, "subscribers_count": 16 }, diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 7b4cae65f1..f288ad4c46 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -45,7 +45,7 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2024-12-26T15:50:10Z", + "updated_at": "2024-12-28T15:30:30Z", "pushed_at": "2021-04-04T09:13:57Z", "stargazers_count": 4148, "watchers_count": 4148, diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index efd447c58c..5f110c4ca8 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -200,7 +200,7 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-12-22T08:19:25Z", + "updated_at": "2024-12-28T15:02:24Z", "pushed_at": "2023-11-24T09:21:56Z", "stargazers_count": 2014, "watchers_count": 2014, diff --git a/2019/CVE-2019-2725.json b/2019/CVE-2019-2725.json index 41c482f8d6..60fec0706f 100644 --- a/2019/CVE-2019-2725.json +++ b/2019/CVE-2019-2725.json @@ -231,10 +231,10 @@ "description": "CVE-2019-2725 命令回显", "fork": false, "created_at": "2019-05-29T01:57:05Z", - "updated_at": "2024-12-10T04:01:54Z", + "updated_at": "2024-12-28T12:55:10Z", "pushed_at": "2023-05-08T16:23:06Z", - "stargazers_count": 438, - "watchers_count": 438, + "stargazers_count": 437, + "watchers_count": 437, "has_discussions": false, "forks_count": 162, "allow_forking": true, @@ -243,7 +243,7 @@ "topics": [], "visibility": "public", "forks": 162, - "watchers": 438, + "watchers": 437, "score": 0, "subscribers_count": 9 }, diff --git a/2020/CVE-2020-11651.json b/2020/CVE-2020-11651.json index 18ae8555e2..f6c14f10d6 100644 --- a/2020/CVE-2020-11651.json +++ b/2020/CVE-2020-11651.json @@ -45,10 +45,10 @@ "description": "Salt security backports for CVE-2020-11651 & CVE-2020-11652", "fork": false, "created_at": "2020-05-01T20:53:49Z", - "updated_at": "2024-08-12T20:00:58Z", + "updated_at": "2024-12-28T12:56:41Z", "pushed_at": "2020-05-18T17:36:18Z", - "stargazers_count": 108, - "watchers_count": 108, + "stargazers_count": 107, + "watchers_count": 107, "has_discussions": false, "forks_count": 17, "allow_forking": true, @@ -62,7 +62,7 @@ ], "visibility": "public", "forks": 17, - "watchers": 108, + "watchers": 107, "score": 0, "subscribers_count": 8 }, diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 0658af358b..551dd61cb8 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -14,7 +14,7 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2024-12-26T15:50:10Z", + "updated_at": "2024-12-28T15:30:30Z", "pushed_at": "2021-04-04T09:13:57Z", "stargazers_count": 4148, "watchers_count": 4148, @@ -251,10 +251,10 @@ "description": "CVE-2020-14882批量验证工具。", "fork": false, "created_at": "2020-10-31T01:43:54Z", - "updated_at": "2022-09-05T15:26:08Z", + "updated_at": "2024-12-28T12:35:30Z", "pushed_at": "2020-12-01T05:05:24Z", - "stargazers_count": 13, - "watchers_count": 13, + "stargazers_count": 12, + "watchers_count": 12, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -263,7 +263,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 13, + "watchers": 12, "score": 0, "subscribers_count": 1 }, @@ -313,10 +313,10 @@ "description": "CVE-2020-14882_ALL综合利用工具,支持命令回显检测、批量命令回显、外置xml无回显命令执行等功能。", "fork": false, "created_at": "2020-11-03T10:49:35Z", - "updated_at": "2024-11-26T08:32:27Z", + "updated_at": "2024-12-28T12:35:31Z", "pushed_at": "2022-03-29T02:08:45Z", - "stargazers_count": 145, - "watchers_count": 145, + "stargazers_count": 144, + "watchers_count": 144, "has_discussions": false, "forks_count": 39, "allow_forking": true, @@ -325,7 +325,7 @@ "topics": [], "visibility": "public", "forks": 39, - "watchers": 145, + "watchers": 144, "score": 0, "subscribers_count": 3 }, diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 17e79d371b..105203edb9 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -14,7 +14,7 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-12-22T08:19:25Z", + "updated_at": "2024-12-28T15:02:24Z", "pushed_at": "2023-11-24T09:21:56Z", "stargazers_count": 2014, "watchers_count": 2014, diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index edd74613d3..3e8b15b561 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -831,10 +831,10 @@ "description": "Root shell PoC for CVE-2021-3156", "fork": false, "created_at": "2021-02-03T19:57:56Z", - "updated_at": "2024-12-28T11:22:59Z", + "updated_at": "2024-12-28T17:58:56Z", "pushed_at": "2022-02-13T12:21:53Z", - "stargazers_count": 146, - "watchers_count": 146, + "stargazers_count": 147, + "watchers_count": 147, "has_discussions": false, "forks_count": 61, "allow_forking": true, @@ -843,7 +843,7 @@ "topics": [], "visibility": "public", "forks": 61, - "watchers": 146, + "watchers": 147, "score": 0, "subscribers_count": 1 }, diff --git a/2021/CVE-2021-4045.json b/2021/CVE-2021-4045.json index 161290187f..a7335b87c2 100644 --- a/2021/CVE-2021-4045.json +++ b/2021/CVE-2021-4045.json @@ -14,10 +14,10 @@ "description": "Exploit for command injection vulnerability found in uhttpd binary from TP-Link Tapo c200 IP camera", "fork": false, "created_at": "2021-11-15T14:48:14Z", - "updated_at": "2024-12-19T00:35:12Z", + "updated_at": "2024-12-28T14:19:05Z", "pushed_at": "2024-10-31T18:50:48Z", - "stargazers_count": 73, - "watchers_count": 73, + "stargazers_count": 74, + "watchers_count": 74, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 9, - "watchers": 73, + "watchers": 74, "score": 0, "subscribers_count": 2 }, diff --git a/2021/CVE-2021-43908.json b/2021/CVE-2021-43908.json index d931b49d2d..a16d5813c8 100644 --- a/2021/CVE-2021-43908.json +++ b/2021/CVE-2021-43908.json @@ -14,10 +14,10 @@ "description": "Trying to reproduce CVE-2021-43908", "fork": false, "created_at": "2022-08-12T05:18:43Z", - "updated_at": "2024-01-17T03:16:39Z", + "updated_at": "2024-12-28T17:29:42Z", "pushed_at": "2022-08-14T12:01:31Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 7, + "watchers": 8, "score": 0, "subscribers_count": 1 } diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 35289713cc..d92f04b818 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -1467,10 +1467,10 @@ "description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228", "fork": false, "created_at": "2021-12-11T11:18:46Z", - "updated_at": "2024-12-11T09:13:46Z", + "updated_at": "2024-12-28T13:11:35Z", "pushed_at": "2022-04-07T14:47:03Z", - "stargazers_count": 852, - "watchers_count": 852, + "stargazers_count": 851, + "watchers_count": 851, "has_discussions": false, "forks_count": 173, "allow_forking": true, @@ -1492,7 +1492,7 @@ ], "visibility": "public", "forks": 173, - "watchers": 852, + "watchers": 851, "score": 0, "subscribers_count": 33 }, @@ -2574,10 +2574,10 @@ "description": "Local Bytecode Scanner for the Log4JShell Vulnerability (CVE-2021-44228)", "fork": false, "created_at": "2021-12-12T11:28:34Z", - "updated_at": "2023-05-10T20:58:01Z", + "updated_at": "2024-12-28T13:09:40Z", "pushed_at": "2022-02-23T19:10:53Z", - "stargazers_count": 50, - "watchers_count": 50, + "stargazers_count": 49, + "watchers_count": 49, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -2594,7 +2594,7 @@ ], "visibility": "public", "forks": 9, - "watchers": 50, + "watchers": 49, "score": 0, "subscribers_count": 8 }, @@ -3749,10 +3749,10 @@ "description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ", "fork": false, "created_at": "2021-12-13T03:57:50Z", - "updated_at": "2024-12-20T11:54:12Z", + "updated_at": "2024-12-28T13:09:44Z", "pushed_at": "2022-11-23T18:23:24Z", - "stargazers_count": 3407, - "watchers_count": 3407, + "stargazers_count": 3406, + "watchers_count": 3406, "has_discussions": true, "forks_count": 740, "allow_forking": true, @@ -3761,7 +3761,7 @@ "topics": [], "visibility": "public", "forks": 740, - "watchers": 3407, + "watchers": 3406, "score": 0, "subscribers_count": 55 }, diff --git a/2023/CVE-2023-1698.json b/2023/CVE-2023-1698.json index 1f71d06e47..c17477c87d 100644 --- a/2023/CVE-2023-1698.json +++ b/2023/CVE-2023-1698.json @@ -30,37 +30,6 @@ "score": 0, "subscribers_count": 2 }, - { - "id": 707534264, - "name": "CVE-2023-1698", - "full_name": "deIndra\/CVE-2023-1698", - "owner": { - "login": "deIndra", - "id": 73511417, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73511417?v=4", - "html_url": "https:\/\/github.com\/deIndra", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/deIndra\/CVE-2023-1698", - "description": null, - "fork": false, - "created_at": "2023-10-20T05:40:32Z", - "updated_at": "2023-10-20T05:44:30Z", - "pushed_at": "2023-10-20T05:44:39Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 707675736, "name": "WAGO-CVE-2023-1698", diff --git a/2023/CVE-2023-20198.json b/2023/CVE-2023-20198.json index 29390b881c..e92f0fe277 100644 --- a/2023/CVE-2023-20198.json +++ b/2023/CVE-2023-20198.json @@ -1,35 +1,4 @@ [ - { - "id": 706041284, - "name": "CVE-2023-20198-checker", - "full_name": "raystr-atearedteam\/CVE-2023-20198-checker", - "owner": { - "login": "raystr-atearedteam", - "id": 143163794, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/143163794?v=4", - "html_url": "https:\/\/github.com\/raystr-atearedteam", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/raystr-atearedteam\/CVE-2023-20198-checker", - "description": null, - "fork": false, - "created_at": "2023-10-17T07:35:50Z", - "updated_at": "2023-10-17T07:36:19Z", - "pushed_at": "2023-10-17T07:52:06Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 706050725, "name": "CVE-2023-20198", @@ -92,37 +61,6 @@ "score": 0, "subscribers_count": 0 }, - { - "id": 706337485, - "name": "Simple-Ansible-for-CVE-2023-20198", - "full_name": "emomeni\/Simple-Ansible-for-CVE-2023-20198", - "owner": { - "login": "emomeni", - "id": 6424128, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6424128?v=4", - "html_url": "https:\/\/github.com\/emomeni", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/emomeni\/Simple-Ansible-for-CVE-2023-20198", - "description": null, - "fork": false, - "created_at": "2023-10-17T18:46:21Z", - "updated_at": "2024-12-11T17:41:30Z", - "pushed_at": "2023-10-17T18:46:32Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, { "id": 706412262, "name": "CVE-2023-20198-Checker", @@ -154,68 +92,6 @@ "score": 0, "subscribers_count": 3 }, - { - "id": 706567964, - "name": "CVE-2023-20198", - "full_name": "JoyGhoshs\/CVE-2023-20198", - "owner": { - "login": "JoyGhoshs", - "id": 36255129, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36255129?v=4", - "html_url": "https:\/\/github.com\/JoyGhoshs", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/JoyGhoshs\/CVE-2023-20198", - "description": "Checker for CVE-2023-20198 , Not a full POC Just checks the implementation and detects if hex is in response or not", - "fork": false, - "created_at": "2023-10-18T07:53:29Z", - "updated_at": "2023-10-18T07:58:31Z", - "pushed_at": "2023-10-18T07:58:28Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 706591699, - "name": "CVE-2023-20198", - "full_name": "Tounsi007\/CVE-2023-20198", - "owner": { - "login": "Tounsi007", - "id": 50546276, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50546276?v=4", - "html_url": "https:\/\/github.com\/Tounsi007", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Tounsi007\/CVE-2023-20198", - "description": "CVE-2023-20198 PoC (!)", - "fork": false, - "created_at": "2023-10-18T08:50:49Z", - "updated_at": "2023-10-26T02:37:03Z", - "pushed_at": "2023-10-17T14:02:51Z", - "stargazers_count": 9, - "watchers_count": 9, - "has_discussions": false, - "forks_count": 6, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 6, - "watchers": 9, - "score": 0, - "subscribers_count": 0 - }, { "id": 706759894, "name": "CVE_2023_20198_Detector", @@ -247,37 +123,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 707531165, - "name": "Cisco_CVE-2023-20198", - "full_name": "reket99\/Cisco_CVE-2023-20198", - "owner": { - "login": "reket99", - "id": 42685719, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42685719?v=4", - "html_url": "https:\/\/github.com\/reket99", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/reket99\/Cisco_CVE-2023-20198", - "description": null, - "fork": false, - "created_at": "2023-10-20T05:28:40Z", - "updated_at": "2023-10-20T09:13:11Z", - "pushed_at": "2023-10-19T13:44:22Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 - }, { "id": 707768225, "name": "cve-2023-20198", diff --git a/2023/CVE-2023-20887.json b/2023/CVE-2023-20887.json index cd205f65b0..cf248e068a 100644 --- a/2023/CVE-2023-20887.json +++ b/2023/CVE-2023-20887.json @@ -14,10 +14,10 @@ "description": "VMWare vRealize Network Insight Pre-Authenticated RCE (CVE-2023-20887)", "fork": false, "created_at": "2023-06-13T13:17:23Z", - "updated_at": "2024-11-15T16:26:25Z", + "updated_at": "2024-12-28T13:10:06Z", "pushed_at": "2023-06-13T14:39:17Z", - "stargazers_count": 233, - "watchers_count": 233, + "stargazers_count": 232, + "watchers_count": 232, "has_discussions": false, "forks_count": 45, "allow_forking": true, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 45, - "watchers": 233, + "watchers": 232, "score": 0, "subscribers_count": 4 }, diff --git a/2023/CVE-2023-20918.json b/2023/CVE-2023-20918.json deleted file mode 100644 index 43902260f9..0000000000 --- a/2023/CVE-2023-20918.json +++ /dev/null @@ -1,64 +0,0 @@ -[ - { - "id": 699801559, - "name": "platform_frameworks_base_AOSP_10_r33_CVE-2023-20918", - "full_name": "pazhanivel07\/platform_frameworks_base_AOSP_10_r33_CVE-2023-20918", - "owner": { - "login": "pazhanivel07", - "id": 97434034, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97434034?v=4", - "html_url": "https:\/\/github.com\/pazhanivel07", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/pazhanivel07\/platform_frameworks_base_AOSP_10_r33_CVE-2023-20918", - "description": null, - "fork": false, - "created_at": "2023-10-03T11:21:35Z", - "updated_at": "2023-10-03T11:29:10Z", - "pushed_at": "2023-10-03T11:29:14Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 699813635, - "name": "platform_frameworks_base_CVE-2023-20918", - "full_name": "Trinadh465\/platform_frameworks_base_CVE-2023-20918", - "owner": { - "login": "Trinadh465", - "id": 102574296, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4", - "html_url": "https:\/\/github.com\/Trinadh465", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Trinadh465\/platform_frameworks_base_CVE-2023-20918", - "description": null, - "fork": false, - "created_at": "2023-10-03T11:52:16Z", - "updated_at": "2023-10-03T11:59:03Z", - "pushed_at": "2023-10-03T11:58:12Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-21238.json b/2023/CVE-2023-21238.json deleted file mode 100644 index ed72c78110..0000000000 --- a/2023/CVE-2023-21238.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 702861024, - "name": "frameworks_base_AOSP10_r33_CVE-2023-21238", - "full_name": "Trinadh465\/frameworks_base_AOSP10_r33_CVE-2023-21238", - "owner": { - "login": "Trinadh465", - "id": 102574296, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4", - "html_url": "https:\/\/github.com\/Trinadh465", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Trinadh465\/frameworks_base_AOSP10_r33_CVE-2023-21238", - "description": null, - "fork": false, - "created_at": "2023-10-10T06:46:00Z", - "updated_at": "2023-10-10T06:57:51Z", - "pushed_at": "2023-10-10T06:56:44Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-21246.json b/2023/CVE-2023-21246.json deleted file mode 100644 index d28a1497ee..0000000000 --- a/2023/CVE-2023-21246.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 702369565, - "name": "frameworks_base_AOSP10_r33_CVE-2023-21246", - "full_name": "Trinadh465\/frameworks_base_AOSP10_r33_CVE-2023-21246", - "owner": { - "login": "Trinadh465", - "id": 102574296, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4", - "html_url": "https:\/\/github.com\/Trinadh465", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Trinadh465\/frameworks_base_AOSP10_r33_CVE-2023-21246", - "description": null, - "fork": false, - "created_at": "2023-10-09T07:33:24Z", - "updated_at": "2023-10-09T07:39:52Z", - "pushed_at": "2023-10-09T11:49:47Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-21251.json b/2023/CVE-2023-21251.json deleted file mode 100644 index fc79c7c97d..0000000000 --- a/2023/CVE-2023-21251.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 703923876, - "name": "frameworks_base_AOSP10_r33_CVE-2023-21251", - "full_name": "Trinadh465\/frameworks_base_AOSP10_r33_CVE-2023-21251", - "owner": { - "login": "Trinadh465", - "id": 102574296, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4", - "html_url": "https:\/\/github.com\/Trinadh465", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Trinadh465\/frameworks_base_AOSP10_r33_CVE-2023-21251", - "description": null, - "fork": false, - "created_at": "2023-10-12T07:30:13Z", - "updated_at": "2023-10-12T07:35:27Z", - "pushed_at": "2023-10-12T07:34:37Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-21272.json b/2023/CVE-2023-21272.json index 1a24be1a61..0228ede7f0 100644 --- a/2023/CVE-2023-21272.json +++ b/2023/CVE-2023-21272.json @@ -29,36 +29,5 @@ "watchers": 0, "score": 0, "subscribers_count": 1 - }, - { - "id": 700750193, - "name": "platform_frameworks_base_AOSP_10_r33_CVE-2023-21272", - "full_name": "pazhanivel07\/platform_frameworks_base_AOSP_10_r33_CVE-2023-21272", - "owner": { - "login": "pazhanivel07", - "id": 97434034, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97434034?v=4", - "html_url": "https:\/\/github.com\/pazhanivel07", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/pazhanivel07\/platform_frameworks_base_AOSP_10_r33_CVE-2023-21272", - "description": null, - "fork": false, - "created_at": "2023-10-05T08:13:35Z", - "updated_at": "2023-10-05T08:21:14Z", - "pushed_at": "2023-10-05T08:20:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-21275.json b/2023/CVE-2023-21275.json deleted file mode 100644 index c358d8f301..0000000000 --- a/2023/CVE-2023-21275.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 700806018, - "name": "packages_apps_ManagedProvisioning_AOSP10_r33_CVE-2023-21275", - "full_name": "Trinadh465\/packages_apps_ManagedProvisioning_AOSP10_r33_CVE-2023-21275", - "owner": { - "login": "Trinadh465", - "id": 102574296, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4", - "html_url": "https:\/\/github.com\/Trinadh465", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Trinadh465\/packages_apps_ManagedProvisioning_AOSP10_r33_CVE-2023-21275", - "description": null, - "fork": false, - "created_at": "2023-10-05T10:30:41Z", - "updated_at": "2023-10-05T10:32:25Z", - "pushed_at": "2023-10-05T10:32:58Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-21281.json b/2023/CVE-2023-21281.json deleted file mode 100644 index c3f7484868..0000000000 --- a/2023/CVE-2023-21281.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 699780067, - "name": "platform_frameworks_base_CVE-2023-21281", - "full_name": "Trinadh465\/platform_frameworks_base_CVE-2023-21281", - "owner": { - "login": "Trinadh465", - "id": 102574296, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4", - "html_url": "https:\/\/github.com\/Trinadh465", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Trinadh465\/platform_frameworks_base_CVE-2023-21281", - "description": null, - "fork": false, - "created_at": "2023-10-03T10:23:48Z", - "updated_at": "2023-10-03T10:32:15Z", - "pushed_at": "2023-10-03T10:31:18Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-21282.json b/2023/CVE-2023-21282.json index 2df78293f1..89c6237f97 100644 --- a/2023/CVE-2023-21282.json +++ b/2023/CVE-2023-21282.json @@ -1,35 +1,4 @@ [ - { - "id": 700249234, - "name": "external_aac_AOSP10_r33_CVE-2023-21282", - "full_name": "Trinadh465\/external_aac_AOSP10_r33_CVE-2023-21282", - "owner": { - "login": "Trinadh465", - "id": 102574296, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4", - "html_url": "https:\/\/github.com\/Trinadh465", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Trinadh465\/external_aac_AOSP10_r33_CVE-2023-21282", - "description": null, - "fork": false, - "created_at": "2023-10-04T08:31:10Z", - "updated_at": "2023-10-04T08:33:06Z", - "pushed_at": "2023-10-04T08:33:39Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 774784509, "name": "external_aac_android-4.2.2_r1_CVE-2023-21282", diff --git a/2023/CVE-2023-21284.json b/2023/CVE-2023-21284.json deleted file mode 100644 index baf36109c3..0000000000 --- a/2023/CVE-2023-21284.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 700773248, - "name": "frameworks_base_AOSP10_r33_CVE-2023-21284", - "full_name": "Trinadh465\/frameworks_base_AOSP10_r33_CVE-2023-21284", - "owner": { - "login": "Trinadh465", - "id": 102574296, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4", - "html_url": "https:\/\/github.com\/Trinadh465", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Trinadh465\/frameworks_base_AOSP10_r33_CVE-2023-21284", - "description": null, - "fork": false, - "created_at": "2023-10-05T09:10:47Z", - "updated_at": "2023-10-05T09:22:59Z", - "pushed_at": "2023-10-05T09:22:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-21286.json b/2023/CVE-2023-21286.json deleted file mode 100644 index 2a28515d00..0000000000 --- a/2023/CVE-2023-21286.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 699793027, - "name": "platform_frameworks_base_CVE-2023-21286", - "full_name": "Trinadh465\/platform_frameworks_base_CVE-2023-21286", - "owner": { - "login": "Trinadh465", - "id": 102574296, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4", - "html_url": "https:\/\/github.com\/Trinadh465", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Trinadh465\/platform_frameworks_base_CVE-2023-21286", - "description": null, - "fork": false, - "created_at": "2023-10-03T10:58:51Z", - "updated_at": "2023-10-03T11:06:54Z", - "pushed_at": "2023-10-03T11:06:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-21288.json b/2023/CVE-2023-21288.json deleted file mode 100644 index 7caf402e2d..0000000000 --- a/2023/CVE-2023-21288.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 700206219, - "name": "platform_frameworks_base_CVE-2023-21288", - "full_name": "Trinadh465\/platform_frameworks_base_CVE-2023-21288", - "owner": { - "login": "Trinadh465", - "id": 102574296, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4", - "html_url": "https:\/\/github.com\/Trinadh465", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Trinadh465\/platform_frameworks_base_CVE-2023-21288", - "description": null, - "fork": false, - "created_at": "2023-10-04T06:42:19Z", - "updated_at": "2023-10-04T06:48:34Z", - "pushed_at": "2023-10-04T07:10:58Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-21768.json b/2023/CVE-2023-21768.json index 81adc7aaf1..a87876358f 100644 --- a/2023/CVE-2023-21768.json +++ b/2023/CVE-2023-21768.json @@ -255,37 +255,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 699311026, - "name": "Recreate-cve-2023-21768", - "full_name": "Rosayxy\/Recreate-cve-2023-21768", - "owner": { - "login": "Rosayxy", - "id": 130039321, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/130039321?v=4", - "html_url": "https:\/\/github.com\/Rosayxy", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Rosayxy\/Recreate-cve-2023-21768", - "description": "recreating exp for cve-2023-21768.", - "fork": false, - "created_at": "2023-10-02T11:36:49Z", - "updated_at": "2023-10-02T13:58:53Z", - "pushed_at": "2023-10-02T12:06:54Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, { "id": 783126137, "name": "CVE-2023-21768", diff --git a/2023/CVE-2023-2215.json b/2023/CVE-2023-2215.json deleted file mode 100644 index 9b0072901b..0000000000 --- a/2023/CVE-2023-2215.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 703479135, - "name": "CVE-2023-2215", - "full_name": "zwxxb\/CVE-2023-2215", - "owner": { - "login": "zwxxb", - "id": 68430832, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68430832?v=4", - "html_url": "https:\/\/github.com\/zwxxb", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/zwxxb\/CVE-2023-2215", - "description": "PoC For CVE-2023-2215 - Auth bypass ", - "fork": false, - "created_at": "2023-10-11T10:16:39Z", - "updated_at": "2023-10-12T11:03:42Z", - "pushed_at": "2023-10-12T14:08:03Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 4, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-22515.json b/2023/CVE-2023-22515.json index bfde6f6ee4..0eaf606536 100644 --- a/2023/CVE-2023-22515.json +++ b/2023/CVE-2023-22515.json @@ -1,137 +1,4 @@ [ - { - "id": 701522727, - "name": "CVE-2023-22515-Scan", - "full_name": "ErikWynter\/CVE-2023-22515-Scan", - "owner": { - "login": "ErikWynter", - "id": 55885619, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55885619?v=4", - "html_url": "https:\/\/github.com\/ErikWynter", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ErikWynter\/CVE-2023-22515-Scan", - "description": "Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence", - "fork": false, - "created_at": "2023-10-06T20:29:44Z", - "updated_at": "2024-10-21T10:39:01Z", - "pushed_at": "2023-10-06T21:59:30Z", - "stargazers_count": 75, - "watchers_count": 75, - "has_discussions": false, - "forks_count": 4, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 4, - "watchers": 75, - "score": 0, - "subscribers_count": 2 - }, - { - "id": 703182036, - "name": "CVE-2023-22515-POC", - "full_name": "j3seer\/CVE-2023-22515-POC", - "owner": { - "login": "j3seer", - "id": 58823465, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58823465?v=4", - "html_url": "https:\/\/github.com\/j3seer", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/j3seer\/CVE-2023-22515-POC", - "description": "Poc for CVE-2023-22515", - "fork": false, - "created_at": "2023-10-10T18:45:10Z", - "updated_at": "2023-11-18T17:19:24Z", - "pushed_at": "2023-10-10T19:59:25Z", - "stargazers_count": 8, - "watchers_count": 8, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 8, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 703240587, - "name": "CVE-2023-22515", - "full_name": "Chocapikk\/CVE-2023-22515", - "owner": { - "login": "Chocapikk", - "id": 88535377, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4", - "html_url": "https:\/\/github.com\/Chocapikk", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-22515", - "description": "CVE-2023-22515: Confluence Broken Access Control Exploit", - "fork": false, - "created_at": "2023-10-10T21:40:09Z", - "updated_at": "2024-11-30T20:03:53Z", - "pushed_at": "2023-10-17T22:04:13Z", - "stargazers_count": 130, - "watchers_count": 130, - "has_discussions": false, - "forks_count": 29, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "broken-access-control", - "confluence", - "cve-2023-22515", - "exploit", - "infosec", - "privilege-escalation", - "security", - "vulnerability" - ], - "visibility": "public", - "forks": 29, - "watchers": 130, - "score": 0, - "subscribers_count": 4 - }, - { - "id": 703437161, - "name": "CVE-2023-22515", - "full_name": "ad-calcium\/CVE-2023-22515", - "owner": { - "login": "ad-calcium", - "id": 33044636, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33044636?v=4", - "html_url": "https:\/\/github.com\/ad-calcium", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ad-calcium\/CVE-2023-22515", - "description": "Confluence未授权添加管理员用户(CVE-2023-22515)漏洞利用工具", - "fork": false, - "created_at": "2023-10-11T08:42:17Z", - "updated_at": "2024-11-16T19:50:13Z", - "pushed_at": "2023-10-16T02:24:02Z", - "stargazers_count": 108, - "watchers_count": 108, - "has_discussions": false, - "forks_count": 10, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 10, - "watchers": 108, - "score": 0, - "subscribers_count": 3 - }, { "id": 703506378, "name": "CVE-2023-22515", @@ -206,99 +73,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 704360942, - "name": "CVE-2023-22515", - "full_name": "Le1a\/CVE-2023-22515", - "owner": { - "login": "Le1a", - "id": 97610822, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97610822?v=4", - "html_url": "https:\/\/github.com\/Le1a", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Le1a\/CVE-2023-22515", - "description": "Confluence Data Center & Server 权限提升漏洞 Exploit", - "fork": false, - "created_at": "2023-10-13T05:18:54Z", - "updated_at": "2023-10-16T05:58:42Z", - "pushed_at": "2023-10-13T05:21:37Z", - "stargazers_count": 5, - "watchers_count": 5, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 5, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 704422927, - "name": "confluence-cve-2023-22515", - "full_name": "Vulnmachines\/confluence-cve-2023-22515", - "owner": { - "login": "Vulnmachines", - "id": 79006904, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4", - "html_url": "https:\/\/github.com\/Vulnmachines", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Vulnmachines\/confluence-cve-2023-22515", - "description": "Confluence Broken Access Control", - "fork": false, - "created_at": "2023-10-13T08:19:07Z", - "updated_at": "2023-10-14T09:17:41Z", - "pushed_at": "2023-10-13T08:23:22Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 704429158, - "name": "CVE-2023-22515", - "full_name": "iveresk\/CVE-2023-22515", - "owner": { - "login": "iveresk", - "id": 28754633, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28754633?v=4", - "html_url": "https:\/\/github.com\/iveresk", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/iveresk\/CVE-2023-22515", - "description": "iveresk-CVE-2023-22515", - "fork": false, - "created_at": "2023-10-13T08:36:21Z", - "updated_at": "2023-10-17T06:31:16Z", - "pushed_at": "2023-10-13T15:43:09Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, { "id": 707587880, "name": "CVE-2023-22515_RCE", diff --git a/2023/CVE-2023-22855.json b/2023/CVE-2023-22855.json deleted file mode 100644 index 60b18a6145..0000000000 --- a/2023/CVE-2023-22855.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 703592151, - "name": "CVE-2023-22855", - "full_name": "vianic\/CVE-2023-22855", - "owner": { - "login": "vianic", - "id": 61748137, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61748137?v=4", - "html_url": "https:\/\/github.com\/vianic", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/vianic\/CVE-2023-22855", - "description": "Security Vulnerability - Kardex Mlog MCC", - "fork": false, - "created_at": "2023-10-11T14:27:08Z", - "updated_at": "2023-10-11T14:27:09Z", - "pushed_at": "2023-10-11T14:34:58Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-24517.json b/2023/CVE-2023-24517.json deleted file mode 100644 index 41f245c92e..0000000000 --- a/2023/CVE-2023-24517.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 705272522, - "name": "CVE-2023-24517", - "full_name": "Argonx21\/CVE-2023-24517", - "owner": { - "login": "Argonx21", - "id": 30073895, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30073895?v=4", - "html_url": "https:\/\/github.com\/Argonx21", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Argonx21\/CVE-2023-24517", - "description": null, - "fork": false, - "created_at": "2023-10-15T14:55:12Z", - "updated_at": "2023-10-15T14:55:13Z", - "pushed_at": "2023-10-15T14:55:13Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-2640.json b/2023/CVE-2023-2640.json index 02f0eaabf9..f715517347 100644 --- a/2023/CVE-2023-2640.json +++ b/2023/CVE-2023-2640.json @@ -61,37 +61,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 702722845, - "name": "CVE-2023-2640-CVE-2023-32629", - "full_name": "g1vi\/CVE-2023-2640-CVE-2023-32629", - "owner": { - "login": "g1vi", - "id": 120142960, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/120142960?v=4", - "html_url": "https:\/\/github.com\/g1vi", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/g1vi\/CVE-2023-2640-CVE-2023-32629", - "description": "GameOver(lay) Ubuntu Privilege Escalation", - "fork": false, - "created_at": "2023-10-09T22:02:42Z", - "updated_at": "2024-12-07T15:13:21Z", - "pushed_at": "2023-10-09T22:44:21Z", - "stargazers_count": 120, - "watchers_count": 120, - "has_discussions": false, - "forks_count": 18, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 18, - "watchers": 120, - "score": 0, - "subscribers_count": 1 - }, { "id": 713583056, "name": "CVE-2023-2640-CVE-2023-32629", diff --git a/2023/CVE-2023-27363.json b/2023/CVE-2023-27363.json index 61c5466688..3b9c368cb5 100644 --- a/2023/CVE-2023-27363.json +++ b/2023/CVE-2023-27363.json @@ -60,36 +60,5 @@ "watchers": 10, "score": 0, "subscribers_count": 3 - }, - { - "id": 702915781, - "name": "-Foxit-PDF-CVE-2023-27363-", - "full_name": "CN016\/-Foxit-PDF-CVE-2023-27363-", - "owner": { - "login": "CN016", - "id": 108575004, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108575004?v=4", - "html_url": "https:\/\/github.com\/CN016", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/CN016\/-Foxit-PDF-CVE-2023-27363-", - "description": "福昕Foxit PDF远程代码执行漏洞(CVE-2023-27363)", - "fork": false, - "created_at": "2023-10-10T08:52:08Z", - "updated_at": "2023-10-10T08:52:09Z", - "pushed_at": "2023-10-10T09:03:53Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-27524.json b/2023/CVE-2023-27524.json index 04e7467ab0..81138eacec 100644 --- a/2023/CVE-2023-27524.json +++ b/2023/CVE-2023-27524.json @@ -251,37 +251,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 702903633, - "name": "Apache-Superset-SECRET_KEY-CVE-2023-27524-", - "full_name": "CN016\/Apache-Superset-SECRET_KEY-CVE-2023-27524-", - "owner": { - "login": "CN016", - "id": 108575004, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108575004?v=4", - "html_url": "https:\/\/github.com\/CN016", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/CN016\/Apache-Superset-SECRET_KEY-CVE-2023-27524-", - "description": "Apache Superset 默认SECRET_KEY 漏洞(CVE-2023-27524)", - "fork": false, - "created_at": "2023-10-10T08:23:57Z", - "updated_at": "2023-10-10T08:34:01Z", - "pushed_at": "2023-10-10T08:33:56Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 711672389, "name": "Research-CVE-2023-27524", diff --git a/2023/CVE-2023-27997.json b/2023/CVE-2023-27997.json index 73c6e140d4..aceb91c957 100644 --- a/2023/CVE-2023-27997.json +++ b/2023/CVE-2023-27997.json @@ -185,68 +185,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 704142501, - "name": "xortigate-cve-2023-27997", - "full_name": "lexfo\/xortigate-cve-2023-27997", - "owner": { - "login": "lexfo", - "id": 23701097, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23701097?v=4", - "html_url": "https:\/\/github.com\/lexfo", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/lexfo\/xortigate-cve-2023-27997", - "description": "xortigate-cve-2023-27997", - "fork": false, - "created_at": "2023-10-12T16:12:41Z", - "updated_at": "2024-10-10T01:56:11Z", - "pushed_at": "2023-10-12T16:17:23Z", - "stargazers_count": 62, - "watchers_count": 62, - "has_discussions": false, - "forks_count": 12, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 12, - "watchers": 62, - "score": 0, - "subscribers_count": 4 - }, - { - "id": 704180144, - "name": "CVE-2023-27997", - "full_name": "delsploit\/CVE-2023-27997", - "owner": { - "login": "delsploit", - "id": 127108998, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127108998?v=4", - "html_url": "https:\/\/github.com\/delsploit", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/delsploit\/CVE-2023-27997", - "description": null, - "fork": false, - "created_at": "2023-10-12T17:50:38Z", - "updated_at": "2024-03-01T09:02:02Z", - "pushed_at": "2023-10-12T18:13:23Z", - "stargazers_count": 9, - "watchers_count": 9, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 9, - "score": 0, - "subscribers_count": 2 - }, { "id": 888520597, "name": "CVE-2023-27997-POC", diff --git a/2023/CVE-2023-28252.json b/2023/CVE-2023-28252.json index ec7eda96bc..2d27dadf21 100644 --- a/2023/CVE-2023-28252.json +++ b/2023/CVE-2023-28252.json @@ -138,10 +138,10 @@ "description": "A modification to fortra's CVE-2023-28252 exploit, compiled to exe", "fork": false, "created_at": "2024-01-22T10:38:02Z", - "updated_at": "2024-12-27T17:23:33Z", + "updated_at": "2024-12-28T12:58:56Z", "pushed_at": "2024-01-24T13:45:56Z", - "stargazers_count": 53, - "watchers_count": 53, + "stargazers_count": 52, + "watchers_count": 52, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -150,7 +150,7 @@ "topics": [], "visibility": "public", "forks": 11, - "watchers": 53, + "watchers": 52, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-28329.json b/2023/CVE-2023-28329.json deleted file mode 100644 index 72c5bda576..0000000000 --- a/2023/CVE-2023-28329.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 706569754, - "name": "CVE-2023-28329", - "full_name": "cli-ish\/CVE-2023-28329", - "owner": { - "login": "cli-ish", - "id": 22986332, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22986332?v=4", - "html_url": "https:\/\/github.com\/cli-ish", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/cli-ish\/CVE-2023-28329", - "description": null, - "fork": false, - "created_at": "2023-10-18T07:58:04Z", - "updated_at": "2023-10-18T07:58:05Z", - "pushed_at": "2023-10-18T07:58:05Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-28330.json b/2023/CVE-2023-28330.json deleted file mode 100644 index 2f62b98f23..0000000000 --- a/2023/CVE-2023-28330.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 706569827, - "name": "CVE-2023-28330", - "full_name": "cli-ish\/CVE-2023-28330", - "owner": { - "login": "cli-ish", - "id": 22986332, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22986332?v=4", - "html_url": "https:\/\/github.com\/cli-ish", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/cli-ish\/CVE-2023-28330", - "description": null, - "fork": false, - "created_at": "2023-10-18T07:58:16Z", - "updated_at": "2023-10-18T07:58:16Z", - "pushed_at": "2023-10-18T07:58:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-2928.json b/2023/CVE-2023-2928.json deleted file mode 100644 index ba463bf290..0000000000 --- a/2023/CVE-2023-2928.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 702913218, - "name": "DedeCMS-getshell-CVE-2023-2928-", - "full_name": "CN016\/DedeCMS-getshell-CVE-2023-2928-", - "owner": { - "login": "CN016", - "id": 108575004, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108575004?v=4", - "html_url": "https:\/\/github.com\/CN016", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/CN016\/DedeCMS-getshell-CVE-2023-2928-", - "description": "DedeCMS文件包含漏洞导致后台getshell(CVE-2023-2928)复现", - "fork": false, - "created_at": "2023-10-10T08:46:17Z", - "updated_at": "2024-11-12T09:02:45Z", - "pushed_at": "2023-10-10T08:46:50Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-29357.json b/2023/CVE-2023-29357.json index b8e6a0c265..9e15176c5f 100644 --- a/2023/CVE-2023-29357.json +++ b/2023/CVE-2023-29357.json @@ -68,37 +68,6 @@ "score": 0, "subscribers_count": 2 }, - { - "id": 703043275, - "name": "CVE-2023-29357-ExE", - "full_name": "KeyStrOke95\/CVE-2023-29357-ExE", - "owner": { - "login": "KeyStrOke95", - "id": 12446252, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12446252?v=4", - "html_url": "https:\/\/github.com\/KeyStrOke95", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/KeyStrOke95\/CVE-2023-29357-ExE", - "description": "Recreation of the SharePoint PoC for CVE-2023-29357 in C# from LuemmelSec", - "fork": false, - "created_at": "2023-10-10T13:41:21Z", - "updated_at": "2024-02-17T23:21:40Z", - "pushed_at": "2023-10-10T13:44:08Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - }, { "id": 734652064, "name": "cve-2023-29357-Sharepoint", diff --git a/2023/CVE-2023-29489.json b/2023/CVE-2023-29489.json index 8cad358bd1..ec7f784372 100644 --- a/2023/CVE-2023-29489.json +++ b/2023/CVE-2023-29489.json @@ -340,37 +340,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 706134149, - "name": "CVE-2023-29489", - "full_name": "S4muraiMelayu1337\/CVE-2023-29489", - "owner": { - "login": "S4muraiMelayu1337", - "id": 130330296, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/130330296?v=4", - "html_url": "https:\/\/github.com\/S4muraiMelayu1337", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/S4muraiMelayu1337\/CVE-2023-29489", - "description": null, - "fork": false, - "created_at": "2023-10-17T11:18:53Z", - "updated_at": "2023-10-17T11:21:12Z", - "pushed_at": "2023-10-17T11:23:34Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 719748102, "name": "CVE-2023-29489", diff --git a/2023/CVE-2023-29922.json b/2023/CVE-2023-29922.json deleted file mode 100644 index 7c5852ce45..0000000000 --- a/2023/CVE-2023-29922.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 702908363, - "name": "Powerjob-CVE-2023-29922-", - "full_name": "CN016\/Powerjob-CVE-2023-29922-", - "owner": { - "login": "CN016", - "id": 108575004, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108575004?v=4", - "html_url": "https:\/\/github.com\/CN016", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/CN016\/Powerjob-CVE-2023-29922-", - "description": "Powerjob 未授权访问漏洞(CVE-2023-29922)", - "fork": false, - "created_at": "2023-10-10T08:35:00Z", - "updated_at": "2023-10-10T08:41:21Z", - "pushed_at": "2023-10-10T08:41:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-31419.json b/2023/CVE-2023-31419.json index 3358ddeea0..3f4b376f7e 100644 --- a/2023/CVE-2023-31419.json +++ b/2023/CVE-2023-31419.json @@ -29,36 +29,5 @@ "watchers": 18, "score": 0, "subscribers_count": 1 - }, - { - "id": 699866265, - "name": "Elasticsearch-CVE-2023-31419", - "full_name": "u238\/Elasticsearch-CVE-2023-31419", - "owner": { - "login": "u238", - "id": 2368573, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2368573?v=4", - "html_url": "https:\/\/github.com\/u238", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/u238\/Elasticsearch-CVE-2023-31419", - "description": "Elasticsearch DoS CVE-2023-31419 exploit", - "fork": false, - "created_at": "2023-10-03T13:51:37Z", - "updated_at": "2023-10-03T13:57:41Z", - "pushed_at": "2023-10-03T13:57:37Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-32315.json b/2023/CVE-2023-32315.json index 0ece21866a..d747853c21 100644 --- a/2023/CVE-2023-32315.json +++ b/2023/CVE-2023-32315.json @@ -220,37 +220,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 702914283, - "name": "Openfire-RCE-CVE-2023-32315-", - "full_name": "CN016\/Openfire-RCE-CVE-2023-32315-", - "owner": { - "login": "CN016", - "id": 108575004, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108575004?v=4", - "html_url": "https:\/\/github.com\/CN016", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/CN016\/Openfire-RCE-CVE-2023-32315-", - "description": "Openfire未授权到RCE(CVE-2023-32315)复现", - "fork": false, - "created_at": "2023-10-10T08:48:42Z", - "updated_at": "2023-10-10T17:25:11Z", - "pushed_at": "2023-10-10T08:49:21Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 732097888, "name": "CVE-2023-32315-EXPLOIT", diff --git a/2023/CVE-2023-32784.json b/2023/CVE-2023-32784.json index dd8db72dab..985b6e81e4 100644 --- a/2023/CVE-2023-32784.json +++ b/2023/CVE-2023-32784.json @@ -219,37 +219,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 706185729, - "name": "poc-CVE-2023-32784", - "full_name": "le01s\/poc-CVE-2023-32784", - "owner": { - "login": "le01s", - "id": 74809607, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74809607?v=4", - "html_url": "https:\/\/github.com\/le01s", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/le01s\/poc-CVE-2023-32784", - "description": null, - "fork": false, - "created_at": "2023-10-17T13:17:08Z", - "updated_at": "2023-10-17T13:18:50Z", - "pushed_at": "2023-10-17T13:18:47Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 751278857, "name": "cve-2023-32784", diff --git a/2023/CVE-2023-33517.json b/2023/CVE-2023-33517.json deleted file mode 100644 index e63fdd6e0a..0000000000 --- a/2023/CVE-2023-33517.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 706987801, - "name": "CVE-2023-33517", - "full_name": "wushigudan\/CVE-2023-33517", - "owner": { - "login": "wushigudan", - "id": 33852122, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33852122?v=4", - "html_url": "https:\/\/github.com\/wushigudan", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/wushigudan\/CVE-2023-33517", - "description": null, - "fork": false, - "created_at": "2023-10-19T02:08:39Z", - "updated_at": "2023-10-19T02:08:39Z", - "pushed_at": "2023-10-19T02:08:39Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-36076.json b/2023/CVE-2023-36076.json deleted file mode 100644 index 3fca8c711d..0000000000 --- a/2023/CVE-2023-36076.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 706041897, - "name": "CVE-2023-36076", - "full_name": "deIndra\/CVE-2023-36076", - "owner": { - "login": "deIndra", - "id": 73511417, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73511417?v=4", - "html_url": "https:\/\/github.com\/deIndra", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/deIndra\/CVE-2023-36076", - "description": null, - "fork": false, - "created_at": "2023-10-17T07:37:24Z", - "updated_at": "2023-10-17T08:09:39Z", - "pushed_at": "2023-10-20T05:45:13Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-36802.json b/2023/CVE-2023-36802.json index a3e937fa35..635a411ad7 100644 --- a/2023/CVE-2023-36802.json +++ b/2023/CVE-2023-36802.json @@ -1,35 +1,4 @@ [ - { - "id": 702634625, - "name": "Windows_MSKSSRV_LPE_CVE-2023-36802", - "full_name": "chompie1337\/Windows_MSKSSRV_LPE_CVE-2023-36802", - "owner": { - "login": "chompie1337", - "id": 56364411, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56364411?v=4", - "html_url": "https:\/\/github.com\/chompie1337", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/chompie1337\/Windows_MSKSSRV_LPE_CVE-2023-36802", - "description": "LPE exploit for CVE-2023-36802", - "fork": false, - "created_at": "2023-10-09T17:32:15Z", - "updated_at": "2024-12-27T19:44:02Z", - "pushed_at": "2023-10-10T17:44:17Z", - "stargazers_count": 160, - "watchers_count": 160, - "has_discussions": false, - "forks_count": 38, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 38, - "watchers": 160, - "score": 0, - "subscribers_count": 5 - }, { "id": 707448488, "name": "CVE-2023-36802", diff --git a/2023/CVE-2023-36845.json b/2023/CVE-2023-36845.json index 3ce4754919..caacc47a41 100644 --- a/2023/CVE-2023-36845.json +++ b/2023/CVE-2023-36845.json @@ -176,68 +176,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 698815248, - "name": "CVE-2023-36845", - "full_name": "simrotion13\/CVE-2023-36845", - "owner": { - "login": "simrotion13", - "id": 29673625, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29673625?v=4", - "html_url": "https:\/\/github.com\/simrotion13", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/simrotion13\/CVE-2023-36845", - "description": null, - "fork": false, - "created_at": "2023-10-01T03:41:40Z", - "updated_at": "2023-10-18T09:56:27Z", - "pushed_at": "2023-10-01T03:43:07Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 699198959, - "name": "CVE-2023-36845-POC", - "full_name": "cyberh3als\/CVE-2023-36845-POC", - "owner": { - "login": "cyberh3als", - "id": 132987956, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/132987956?v=4", - "html_url": "https:\/\/github.com\/cyberh3als", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/cyberh3als\/CVE-2023-36845-POC", - "description": "CVE-2023-36845 PoC script automates the PoC for CVE-2023-36845 targeting Juniper Networks Junos OS's J-Web component on EX and SRX Series devices. It exploits a PHP flaw, allowing remote modification of the PHPRC variable. Successful exploitation can lead to code injection and execution.", - "fork": false, - "created_at": "2023-10-02T06:28:07Z", - "updated_at": "2024-02-28T20:08:22Z", - "pushed_at": "2023-10-02T10:31:32Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - }, { "id": 719033136, "name": "ansible-cve-2023-36845", diff --git a/2023/CVE-2023-38545.json b/2023/CVE-2023-38545.json index 39698751c4..783d31fd24 100644 --- a/2023/CVE-2023-38545.json +++ b/2023/CVE-2023-38545.json @@ -1,190 +1,4 @@ [ - { - "id": 703424578, - "name": "CVE-2023-38545", - "full_name": "UTsweetyfish\/CVE-2023-38545", - "owner": { - "login": "UTsweetyfish", - "id": 124018391, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/124018391?v=4", - "html_url": "https:\/\/github.com\/UTsweetyfish", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/UTsweetyfish\/CVE-2023-38545", - "description": "Simple PoC causing overflow", - "fork": false, - "created_at": "2023-10-11T08:11:56Z", - "updated_at": "2024-07-16T05:05:39Z", - "pushed_at": "2023-10-11T08:17:06Z", - "stargazers_count": 17, - "watchers_count": 17, - "has_discussions": false, - "forks_count": 4, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 4, - "watchers": 17, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 703918600, - "name": "CVE-2023-38545", - "full_name": "imfht\/CVE-2023-38545", - "owner": { - "login": "imfht", - "id": 15059493, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15059493?v=4", - "html_url": "https:\/\/github.com\/imfht", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/imfht\/CVE-2023-38545", - "description": "😄 CVE-2023-38545堆溢出的POC和分析文章", - "fork": false, - "created_at": "2023-10-12T07:16:49Z", - "updated_at": "2024-06-27T11:49:13Z", - "pushed_at": "2023-10-12T08:46:50Z", - "stargazers_count": 9, - "watchers_count": 9, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 9, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 703927800, - "name": "CVE-2023-38545-libcurl-SOCKS5-heap-buffer-overflow", - "full_name": "fatmo666\/CVE-2023-38545-libcurl-SOCKS5-heap-buffer-overflow", - "owner": { - "login": "fatmo666", - "id": 56080837, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56080837?v=4", - "html_url": "https:\/\/github.com\/fatmo666", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/fatmo666\/CVE-2023-38545-libcurl-SOCKS5-heap-buffer-overflow", - "description": "Simple PoC causing overflow", - "fork": false, - "created_at": "2023-10-12T07:39:15Z", - "updated_at": "2023-10-20T06:02:30Z", - "pushed_at": "2023-10-15T11:01:23Z", - "stargazers_count": 7, - "watchers_count": 7, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 3, - "watchers": 7, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 704156567, - "name": "CVE-2023-38545-sample", - "full_name": "vanigori\/CVE-2023-38545-sample", - "owner": { - "login": "vanigori", - "id": 13760557, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13760557?v=4", - "html_url": "https:\/\/github.com\/vanigori", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/vanigori\/CVE-2023-38545-sample", - "description": "Dockerfile containing all the necessary setup files to demo the exploit ", - "fork": false, - "created_at": "2023-10-12T16:48:26Z", - "updated_at": "2024-04-02T05:39:46Z", - "pushed_at": "2023-10-13T10:10:43Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 705589874, - "name": "CVE-2023-38545-POC", - "full_name": "dbrugman\/CVE-2023-38545-POC", - "owner": { - "login": "dbrugman", - "id": 22774256, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22774256?v=4", - "html_url": "https:\/\/github.com\/dbrugman", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/dbrugman\/CVE-2023-38545-POC", - "description": "CVE-2023-38545 POC for the curl command line tool", - "fork": false, - "created_at": "2023-10-16T10:04:19Z", - "updated_at": "2023-12-03T07:24:07Z", - "pushed_at": "2023-10-16T10:18:36Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 705743940, - "name": "CVE-2023-38545", - "full_name": "bcdannyboy\/CVE-2023-38545", - "owner": { - "login": "bcdannyboy", - "id": 12553297, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12553297?v=4", - "html_url": "https:\/\/github.com\/bcdannyboy", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/bcdannyboy\/CVE-2023-38545", - "description": "A proof of concept for testing CVE-2023-38545 against local curl", - "fork": false, - "created_at": "2023-10-16T15:55:32Z", - "updated_at": "2024-09-06T14:09:19Z", - "pushed_at": "2023-10-16T20:47:40Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 4, - "score": 0, - "subscribers_count": 2 - }, { "id": 706076873, "name": "CVE-2023-38545", diff --git a/2023/CVE-2023-38646.json b/2023/CVE-2023-38646.json index 5bfd70f7dd..47949d7a6b 100644 --- a/2023/CVE-2023-38646.json +++ b/2023/CVE-2023-38646.json @@ -437,68 +437,6 @@ "score": 0, "subscribers_count": 2 }, - { - "id": 701997863, - "name": "CVE-2023-38646", - "full_name": "yxl2001\/CVE-2023-38646", - "owner": { - "login": "yxl2001", - "id": 56950033, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56950033?v=4", - "html_url": "https:\/\/github.com\/yxl2001", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/yxl2001\/CVE-2023-38646", - "description": null, - "fork": false, - "created_at": "2023-10-08T07:36:57Z", - "updated_at": "2023-10-08T07:47:59Z", - "pushed_at": "2023-10-08T07:51:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 702119098, - "name": "CVE-2023-38646", - "full_name": "alexandre-pecorilla\/CVE-2023-38646", - "owner": { - "login": "alexandre-pecorilla", - "id": 76220633, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76220633?v=4", - "html_url": "https:\/\/github.com\/alexandre-pecorilla", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/alexandre-pecorilla\/CVE-2023-38646", - "description": "CVE-2023-38646 Pre-Auth RCE in Metabase", - "fork": false, - "created_at": "2023-10-08T14:52:35Z", - "updated_at": "2023-10-10T18:09:37Z", - "pushed_at": "2023-10-08T15:25:52Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, { "id": 702259752, "name": "metabase-pre-auth-rce-poc", @@ -536,228 +474,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 702912772, - "name": "Metabase-H2-CVE-2023-38646-", - "full_name": "CN016\/Metabase-H2-CVE-2023-38646-", - "owner": { - "login": "CN016", - "id": 108575004, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108575004?v=4", - "html_url": "https:\/\/github.com\/CN016", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/CN016\/Metabase-H2-CVE-2023-38646-", - "description": "Metabase H2 远程代码执行漏洞(CVE-2023-38646)", - "fork": false, - "created_at": "2023-10-10T08:45:14Z", - "updated_at": "2023-10-10T08:45:57Z", - "pushed_at": "2023-10-10T08:45:51Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 703324516, - "name": "MetabaseRceTools", - "full_name": "Boogipop\/MetabaseRceTools", - "owner": { - "login": "Boogipop", - "id": 114604850, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114604850?v=4", - "html_url": "https:\/\/github.com\/Boogipop", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Boogipop\/MetabaseRceTools", - "description": "CVE-2023-38646 Metabase RCE", - "fork": false, - "created_at": "2023-10-11T03:18:09Z", - "updated_at": "2024-12-26T05:01:51Z", - "pushed_at": "2023-10-11T04:06:43Z", - "stargazers_count": 51, - "watchers_count": 51, - "has_discussions": false, - "forks_count": 5, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2023-38646", - "gui", - "metabase", - "rce" - ], - "visibility": "public", - "forks": 5, - "watchers": 51, - "score": 0, - "subscribers_count": 2 - }, - { - "id": 703739148, - "name": "CVE-2023-38646", - "full_name": "nickswink\/CVE-2023-38646", - "owner": { - "login": "nickswink", - "id": 57839593, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57839593?v=4", - "html_url": "https:\/\/github.com\/nickswink", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/nickswink\/CVE-2023-38646", - "description": "CVE-2023-38646 Unauthenticated RCE vulnerability in Metabase ", - "fork": false, - "created_at": "2023-10-11T20:17:14Z", - "updated_at": "2023-11-03T07:26:19Z", - "pushed_at": "2023-10-12T14:41:02Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 703830211, - "name": "CVE-2023-38646", - "full_name": "passwa11\/CVE-2023-38646", - "owner": { - "login": "passwa11", - "id": 112363374, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112363374?v=4", - "html_url": "https:\/\/github.com\/passwa11", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/passwa11\/CVE-2023-38646", - "description": null, - "fork": false, - "created_at": "2023-10-12T02:24:12Z", - "updated_at": "2023-10-12T02:24:24Z", - "pushed_at": "2023-10-12T02:24:21Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 704099223, - "name": "CVE-2023-38646", - "full_name": "threatHNTR\/CVE-2023-38646", - "owner": { - "login": "threatHNTR", - "id": 102164992, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102164992?v=4", - "html_url": "https:\/\/github.com\/threatHNTR", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/threatHNTR\/CVE-2023-38646", - "description": "This is a Proof of Concept (PoC) script for exploiting Metabase, an open-source business intelligence and data analytics tool.", - "fork": false, - "created_at": "2023-10-12T14:32:17Z", - "updated_at": "2023-12-04T16:03:16Z", - "pushed_at": "2023-10-17T22:12:30Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 704953176, - "name": "CVE-2023-38646", - "full_name": "asepsaepdin\/CVE-2023-38646", - "owner": { - "login": "asepsaepdin", - "id": 122620685, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122620685?v=4", - "html_url": "https:\/\/github.com\/asepsaepdin", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/asepsaepdin\/CVE-2023-38646", - "description": null, - "fork": false, - "created_at": "2023-10-14T15:56:18Z", - "updated_at": "2023-10-14T15:57:18Z", - "pushed_at": "2023-10-14T16:56:02Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 705088605, - "name": "CVE-2023-38646", - "full_name": "Pyr0sec\/CVE-2023-38646", - "owner": { - "login": "Pyr0sec", - "id": 74669749, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74669749?v=4", - "html_url": "https:\/\/github.com\/Pyr0sec", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Pyr0sec\/CVE-2023-38646", - "description": "Exploit script for Pre-Auth RCE in Metabase (CVE-2023-38646)", - "fork": false, - "created_at": "2023-10-15T01:29:37Z", - "updated_at": "2024-10-02T09:48:29Z", - "pushed_at": "2023-10-15T01:51:31Z", - "stargazers_count": 8, - "watchers_count": 8, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 8, - "score": 0, - "subscribers_count": 2 - }, { "id": 706044373, "name": "CVE-2023-38646", diff --git a/2023/CVE-2023-38743.json b/2023/CVE-2023-38743.json deleted file mode 100644 index 90ff7e8214..0000000000 --- a/2023/CVE-2023-38743.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 699139356, - "name": "CVE-2023-38743", - "full_name": "PetrusViet\/CVE-2023-38743", - "owner": { - "login": "PetrusViet", - "id": 63145078, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63145078?v=4", - "html_url": "https:\/\/github.com\/PetrusViet", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/PetrusViet\/CVE-2023-38743", - "description": "ManageEngine ADManager Command Injection", - "fork": false, - "created_at": "2023-10-02T02:14:23Z", - "updated_at": "2024-07-16T14:56:27Z", - "pushed_at": "2023-10-02T05:58:14Z", - "stargazers_count": 12, - "watchers_count": 12, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 12, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-38829.json b/2023/CVE-2023-38829.json index 7412913061..c1a4d30bd5 100644 --- a/2023/CVE-2023-38829.json +++ b/2023/CVE-2023-38829.json @@ -42,11 +42,11 @@ "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Victorique-123\/CVE-2023-38829-NETIS-WF2409E_Report", - "description": null, + "description": "对NETIS WF2409E路由器进行的一次完整硬件安全分析研究。通过对设备进行拆解分析、调试接口识别、固件提取等工作,记录了硬件分析的全过程、漏洞细节以及相应的安全建议,希望能帮助提高物联网设备的安全性。", "fork": false, "created_at": "2024-12-27T18:09:13Z", - "updated_at": "2024-12-27T18:09:13Z", - "pushed_at": "2024-12-27T18:09:13Z", + "updated_at": "2024-12-28T13:40:36Z", + "pushed_at": "2024-12-28T13:40:33Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2023/CVE-2023-38831.json b/2023/CVE-2023-38831.json index 066e2d6a34..69bc936d6b 100644 --- a/2023/CVE-2023-38831.json +++ b/2023/CVE-2023-38831.json @@ -871,37 +871,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 704052455, - "name": "CVE-2023-38831", - "full_name": "ruycr4ft\/CVE-2023-38831", - "owner": { - "login": "ruycr4ft", - "id": 103446004, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103446004?v=4", - "html_url": "https:\/\/github.com\/ruycr4ft", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ruycr4ft\/CVE-2023-38831", - "description": null, - "fork": false, - "created_at": "2023-10-12T12:46:35Z", - "updated_at": "2023-10-12T16:13:22Z", - "pushed_at": "2023-10-12T13:23:29Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, { "id": 708148022, "name": "CVE-2023-38831", diff --git a/2023/CVE-2023-40044.json b/2023/CVE-2023-40044.json deleted file mode 100644 index 489bc1b764..0000000000 --- a/2023/CVE-2023-40044.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 699398275, - "name": "WS_FTP-CVE-2023-40044", - "full_name": "kenbuckler\/WS_FTP-CVE-2023-40044", - "owner": { - "login": "kenbuckler", - "id": 69703097, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69703097?v=4", - "html_url": "https:\/\/github.com\/kenbuckler", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/kenbuckler\/WS_FTP-CVE-2023-40044", - "description": "Analysis of WS_FTP CVE", - "fork": false, - "created_at": "2023-10-02T14:55:38Z", - "updated_at": "2023-10-19T14:30:24Z", - "pushed_at": "2023-10-02T15:23:30Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-40361.json b/2023/CVE-2023-40361.json deleted file mode 100644 index e0d667ad6f..0000000000 --- a/2023/CVE-2023-40361.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 705558213, - "name": "CVE-2023-40361", - "full_name": "vianic\/CVE-2023-40361", - "owner": { - "login": "vianic", - "id": 61748137, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61748137?v=4", - "html_url": "https:\/\/github.com\/vianic", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/vianic\/CVE-2023-40361", - "description": "Security Vulnerability - SECUDOS Qiata", - "fork": false, - "created_at": "2023-10-16T08:49:25Z", - "updated_at": "2023-10-16T08:49:25Z", - "pushed_at": "2023-10-16T10:38:07Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-40429.json b/2023/CVE-2023-40429.json deleted file mode 100644 index 69f1794df7..0000000000 --- a/2023/CVE-2023-40429.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 702720524, - "name": "cve-2023-40429-ez-device-name", - "full_name": "biscuitehh\/cve-2023-40429-ez-device-name", - "owner": { - "login": "biscuitehh", - "id": 507442, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/507442?v=4", - "html_url": "https:\/\/github.com\/biscuitehh", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/biscuitehh\/cve-2023-40429-ez-device-name", - "description": "CVE-2023-40429: An app may be able to access sensitive user data.", - "fork": false, - "created_at": "2023-10-09T21:52:56Z", - "updated_at": "2024-04-14T18:03:42Z", - "pushed_at": "2023-10-09T22:21:04Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 4, - "score": 0, - "subscribers_count": 2 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-4169.json b/2023/CVE-2023-4169.json deleted file mode 100644 index 63fd3b1d8d..0000000000 --- a/2023/CVE-2023-4169.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 705480946, - "name": "CVE-2023-4169_CVE-2023-3306_CVE-2023-4415", - "full_name": "thedarknessdied\/CVE-2023-4169_CVE-2023-3306_CVE-2023-4415", - "owner": { - "login": "thedarknessdied", - "id": 56123966, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56123966?v=4", - "html_url": "https:\/\/github.com\/thedarknessdied", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/thedarknessdied\/CVE-2023-4169_CVE-2023-3306_CVE-2023-4415", - "description": "Ruijie-RG-EW1200G CVE-2023-4169_CVE-2023-3306_CVE-2023-4415", - "fork": false, - "created_at": "2023-10-16T05:08:06Z", - "updated_at": "2024-07-06T01:05:43Z", - "pushed_at": "2023-10-18T12:27:17Z", - "stargazers_count": 27, - "watchers_count": 27, - "has_discussions": false, - "forks_count": 6, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 6, - "watchers": 27, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-41892.json b/2023/CVE-2023-41892.json index cd5d15de40..a7265f39c9 100644 --- a/2023/CVE-2023-41892.json +++ b/2023/CVE-2023-41892.json @@ -1,35 +1,4 @@ [ - { - "id": 701130009, - "name": "CVE-2023-41892", - "full_name": "zaenhaxor\/CVE-2023-41892", - "owner": { - "login": "zaenhaxor", - "id": 83585135, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83585135?v=4", - "html_url": "https:\/\/github.com\/zaenhaxor", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/zaenhaxor\/CVE-2023-41892", - "description": "CVE-2023-41892 - Craft CMS Remote Code Execution (RCE)", - "fork": false, - "created_at": "2023-10-06T01:40:34Z", - "updated_at": "2024-09-27T09:59:05Z", - "pushed_at": "2023-10-07T03:26:00Z", - "stargazers_count": 5, - "watchers_count": 5, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 5, - "score": 0, - "subscribers_count": 1 - }, { "id": 736015392, "name": "CraftCMS_CVE-2023-41892", diff --git a/2023/CVE-2023-41993.json b/2023/CVE-2023-41993.json index a5e93caddc..228f7d247c 100644 --- a/2023/CVE-2023-41993.json +++ b/2023/CVE-2023-41993.json @@ -30,37 +30,6 @@ "score": 0, "subscribers_count": 10 }, - { - "id": 705738898, - "name": "cve-2023-41993-test", - "full_name": "hrtowii\/cve-2023-41993-test", - "owner": { - "login": "hrtowii", - "id": 68852354, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68852354?v=4", - "html_url": "https:\/\/github.com\/hrtowii", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/hrtowii\/cve-2023-41993-test", - "description": "testing poc", - "fork": false, - "created_at": "2023-10-16T15:43:50Z", - "updated_at": "2024-09-03T07:10:23Z", - "pushed_at": "2023-10-18T17:58:35Z", - "stargazers_count": 17, - "watchers_count": 17, - "has_discussions": false, - "forks_count": 8, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 8, - "watchers": 17, - "score": 0, - "subscribers_count": 3 - }, { "id": 705857370, "name": "CVE-2023-41993", diff --git a/2023/CVE-2023-42793.json b/2023/CVE-2023-42793.json index 9eba79610c..d9a3514715 100644 --- a/2023/CVE-2023-42793.json +++ b/2023/CVE-2023-42793.json @@ -66,37 +66,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 701008513, - "name": "CVE-2023-42793", - "full_name": "Zenmovie\/CVE-2023-42793", - "owner": { - "login": "Zenmovie", - "id": 98185655, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98185655?v=4", - "html_url": "https:\/\/github.com\/Zenmovie", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Zenmovie\/CVE-2023-42793", - "description": "PoC of CVE-2023-42793", - "fork": false, - "created_at": "2023-10-05T18:12:25Z", - "updated_at": "2024-10-30T06:55:54Z", - "pushed_at": "2023-10-11T11:40:05Z", - "stargazers_count": 7, - "watchers_count": 7, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 7, - "score": 0, - "subscribers_count": 1 - }, { "id": 740232498, "name": "CVE-2023-42793_POC", diff --git a/2023/CVE-2023-42820.json b/2023/CVE-2023-42820.json index 97d30b7aa6..e85cad047d 100644 --- a/2023/CVE-2023-42820.json +++ b/2023/CVE-2023-42820.json @@ -29,36 +29,5 @@ "watchers": 55, "score": 0, "subscribers_count": 2 - }, - { - "id": 703323724, - "name": "cve-2023-42820", - "full_name": "Startr4ck\/cve-2023-42820", - "owner": { - "login": "Startr4ck", - "id": 53632236, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53632236?v=4", - "html_url": "https:\/\/github.com\/Startr4ck", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Startr4ck\/cve-2023-42820", - "description": "JumpServer ", - "fork": false, - "created_at": "2023-10-11T03:15:30Z", - "updated_at": "2024-01-18T12:33:14Z", - "pushed_at": "2023-10-12T08:16:13Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-43144.json b/2023/CVE-2023-43144.json deleted file mode 100644 index eab93a1aed..0000000000 --- a/2023/CVE-2023-43144.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 704649398, - "name": "CVE-2023-43144", - "full_name": "Pegasus0xx\/CVE-2023-43144", - "owner": { - "login": "Pegasus0xx", - "id": 122263374, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122263374?v=4", - "html_url": "https:\/\/github.com\/Pegasus0xx", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Pegasus0xx\/CVE-2023-43144", - "description": "Assets Management System 1.0 is vulnerable to SQL injection via the id parameter in delete.php", - "fork": false, - "created_at": "2023-10-13T18:19:22Z", - "updated_at": "2023-10-13T18:19:22Z", - "pushed_at": "2023-10-13T18:20:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-43147.json b/2023/CVE-2023-43147.json deleted file mode 100644 index f0dc80e83c..0000000000 --- a/2023/CVE-2023-43147.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 703710841, - "name": "CVE-2023-43147", - "full_name": "MinoTauro2020\/CVE-2023-43147", - "owner": { - "login": "MinoTauro2020", - "id": 65294596, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65294596?v=4", - "html_url": "https:\/\/github.com\/MinoTauro2020", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/MinoTauro2020\/CVE-2023-43147", - "description": "CVE-2023-43148", - "fork": false, - "created_at": "2023-10-11T18:55:40Z", - "updated_at": "2024-07-22T05:50:46Z", - "pushed_at": "2023-10-12T16:22:10Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-43149.json b/2023/CVE-2023-43149.json deleted file mode 100644 index 9609adff8b..0000000000 --- a/2023/CVE-2023-43149.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 704142072, - "name": "CVE-2023-43149", - "full_name": "MinoTauro2020\/CVE-2023-43149", - "owner": { - "login": "MinoTauro2020", - "id": 65294596, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65294596?v=4", - "html_url": "https:\/\/github.com\/MinoTauro2020", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/MinoTauro2020\/CVE-2023-43149", - "description": "CVE-2023-43149", - "fork": false, - "created_at": "2023-10-12T16:11:39Z", - "updated_at": "2024-07-22T07:13:14Z", - "pushed_at": "2023-10-12T16:23:43Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-43284.json b/2023/CVE-2023-43284.json deleted file mode 100644 index d84aabbbaf..0000000000 --- a/2023/CVE-2023-43284.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 700363228, - "name": "CVE-2023-43284", - "full_name": "MateusTesser\/CVE-2023-43284", - "owner": { - "login": "MateusTesser", - "id": 45717435, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45717435?v=4", - "html_url": "https:\/\/github.com\/MateusTesser", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/MateusTesser\/CVE-2023-43284", - "description": "DLink DIR-846 Authenticated Remote Code Execution", - "fork": false, - "created_at": "2023-10-04T13:07:37Z", - "updated_at": "2024-05-16T03:37:47Z", - "pushed_at": "2023-10-04T13:31:59Z", - "stargazers_count": 18, - "watchers_count": 18, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 3, - "watchers": 18, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-43838.json b/2023/CVE-2023-43838.json deleted file mode 100644 index f7acc36f81..0000000000 --- a/2023/CVE-2023-43838.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 699413146, - "name": "CVE-2023-43838", - "full_name": "rootd4ddy\/CVE-2023-43838", - "owner": { - "login": "rootd4ddy", - "id": 129632649, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129632649?v=4", - "html_url": "https:\/\/github.com\/rootd4ddy", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/rootd4ddy\/CVE-2023-43838", - "description": "Public disclosure for CVE-2023-31584.", - "fork": false, - "created_at": "2023-10-02T15:27:07Z", - "updated_at": "2023-11-28T01:28:13Z", - "pushed_at": "2023-10-02T15:32:30Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-44487.json b/2023/CVE-2023-44487.json index 0efa6aa96c..9a493a7fad 100644 --- a/2023/CVE-2023-44487.json +++ b/2023/CVE-2023-44487.json @@ -30,107 +30,6 @@ "score": 0, "subscribers_count": 6 }, - { - "id": 703303512, - "name": "CVE-2023-44487", - "full_name": "imabee101\/CVE-2023-44487", - "owner": { - "login": "imabee101", - "id": 29169122, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29169122?v=4", - "html_url": "https:\/\/github.com\/imabee101", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/imabee101\/CVE-2023-44487", - "description": "Proof of concept for DoS exploit ", - "fork": false, - "created_at": "2023-10-11T01:59:47Z", - "updated_at": "2024-10-11T01:41:10Z", - "pushed_at": "2023-10-13T11:19:10Z", - "stargazers_count": 52, - "watchers_count": 52, - "has_discussions": false, - "forks_count": 16, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve", - "cve-2023-44487", - "ddos", - "dos", - "dos-attack", - "poc", - "proof-of-concept" - ], - "visibility": "public", - "forks": 16, - "watchers": 52, - "score": 0, - "subscribers_count": 2 - }, - { - "id": 703845749, - "name": "CVE-2023-44487", - "full_name": "ByteHackr\/CVE-2023-44487", - "owner": { - "login": "ByteHackr", - "id": 30409831, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30409831?v=4", - "html_url": "https:\/\/github.com\/ByteHackr", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ByteHackr\/CVE-2023-44487", - "description": "Test Script for CVE-2023-44487", - "fork": false, - "created_at": "2023-10-12T03:14:34Z", - "updated_at": "2023-10-12T03:30:38Z", - "pushed_at": "2023-10-12T03:30:35Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 703914770, - "name": "rapidreset", - "full_name": "pabloec20\/rapidreset", - "owner": { - "login": "pabloec20", - "id": 24191742, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24191742?v=4", - "html_url": "https:\/\/github.com\/pabloec20", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/pabloec20\/rapidreset", - "description": "CVE-2023-44487", - "fork": false, - "created_at": "2023-10-12T07:06:42Z", - "updated_at": "2024-06-27T16:58:23Z", - "pushed_at": "2023-10-12T07:11:17Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 704732969, "name": "rapidresetclient", @@ -162,47 +61,6 @@ "score": 0, "subscribers_count": 4 }, - { - "id": 705614213, - "name": "CVE-2023-44487", - "full_name": "studiogangster\/CVE-2023-44487", - "owner": { - "login": "studiogangster", - "id": 12793420, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12793420?v=4", - "html_url": "https:\/\/github.com\/studiogangster", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/studiogangster\/CVE-2023-44487", - "description": "A python based exploit to test out rapid reset attack (CVE-2023-44487)", - "fork": false, - "created_at": "2023-10-16T11:07:50Z", - "updated_at": "2024-08-11T14:52:28Z", - "pushed_at": "2023-10-16T12:32:50Z", - "stargazers_count": 16, - "watchers_count": 16, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2023-44487", - "cybersecurity", - "exploit", - "http2", - "rapid", - "rapid-reset", - "reset", - "security", - "zero-day" - ], - "visibility": "public", - "forks": 3, - "watchers": 16, - "score": 0, - "subscribers_count": 1 - }, { "id": 709722803, "name": "golang-CVE-2023-44487", diff --git a/2023/CVE-2023-44961.json b/2023/CVE-2023-44961.json deleted file mode 100644 index 090cbb9221..0000000000 --- a/2023/CVE-2023-44961.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 700732996, - "name": "CVE-2023-44961", - "full_name": "ggb0n\/CVE-2023-44961", - "owner": { - "login": "ggb0n", - "id": 41365666, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41365666?v=4", - "html_url": "https:\/\/github.com\/ggb0n", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ggb0n\/CVE-2023-44961", - "description": "PoC for CVE-2023-44961", - "fork": false, - "created_at": "2023-10-05T07:27:45Z", - "updated_at": "2023-10-12T05:00:13Z", - "pushed_at": "2023-10-12T05:00:10Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": true, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-44962.json b/2023/CVE-2023-44962.json deleted file mode 100644 index a578ec550a..0000000000 --- a/2023/CVE-2023-44962.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 700738589, - "name": "CVE-2023-44962", - "full_name": "ggb0n\/CVE-2023-44962", - "owner": { - "login": "ggb0n", - "id": 41365666, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41365666?v=4", - "html_url": "https:\/\/github.com\/ggb0n", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ggb0n\/CVE-2023-44962", - "description": "PoC for CVE-2023-44962", - "fork": false, - "created_at": "2023-10-05T07:43:07Z", - "updated_at": "2023-12-03T18:02:25Z", - "pushed_at": "2023-10-11T04:58:41Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": true, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-45471.json b/2023/CVE-2023-45471.json deleted file mode 100644 index 702c8eeca0..0000000000 --- a/2023/CVE-2023-45471.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 704942565, - "name": "CVE-2023-45471", - "full_name": "mehdibelhajamor\/CVE-2023-45471", - "owner": { - "login": "mehdibelhajamor", - "id": 62826765, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62826765?v=4", - "html_url": "https:\/\/github.com\/mehdibelhajamor", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/mehdibelhajamor\/CVE-2023-45471", - "description": null, - "fork": false, - "created_at": "2023-10-14T15:20:37Z", - "updated_at": "2023-10-14T16:46:59Z", - "pushed_at": "2023-10-14T16:43:01Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-45828.json b/2023/CVE-2023-45828.json deleted file mode 100644 index 92ee0804e6..0000000000 --- a/2023/CVE-2023-45828.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 706068061, - "name": "CVE-2023-45828", - "full_name": "RandomRobbieBF\/CVE-2023-45828", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2023-45828", - "description": "RumbleTalk Live Group Chat <= 6.1.9 - Missing Authorization via handleRequest", - "fork": false, - "created_at": "2023-10-17T08:41:54Z", - "updated_at": "2024-08-12T20:32:54Z", - "pushed_at": "2023-10-17T08:58:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 2 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-45857.json b/2023/CVE-2023-45857.json index a19d6a881c..88e15b83e5 100644 --- a/2023/CVE-2023-45857.json +++ b/2023/CVE-2023-45857.json @@ -1,35 +1,4 @@ [ - { - "id": 706677544, - "name": "CVE-2023-45857", - "full_name": "valentin-panov\/CVE-2023-45857", - "owner": { - "login": "valentin-panov", - "id": 63700910, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63700910?v=4", - "html_url": "https:\/\/github.com\/valentin-panov", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/valentin-panov\/CVE-2023-45857", - "description": null, - "fork": false, - "created_at": "2023-10-18T12:19:34Z", - "updated_at": "2023-10-18T19:25:42Z", - "pushed_at": "2023-10-19T15:20:32Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 710123753, "name": "CVE-2023-45857-Demo", diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index e537a44885..4a93114045 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -14,7 +14,7 @@ "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "fork": false, "created_at": "2024-01-16T06:52:02Z", - "updated_at": "2024-12-28T11:30:43Z", + "updated_at": "2024-12-28T12:43:30Z", "pushed_at": "2024-08-18T08:26:46Z", "stargazers_count": 1313, "watchers_count": 1313, diff --git a/2023/CVE-2023-45966.json b/2023/CVE-2023-45966.json deleted file mode 100644 index b5a191f8d0..0000000000 --- a/2023/CVE-2023-45966.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 706845140, - "name": "CVE-2023-45966", - "full_name": "jet-pentest\/CVE-2023-45966", - "owner": { - "login": "jet-pentest", - "id": 71512502, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71512502?v=4", - "html_url": "https:\/\/github.com\/jet-pentest", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/jet-pentest\/CVE-2023-45966", - "description": "Blind SSRF in umputun\/remark42 <= 1.12.1", - "fork": false, - "created_at": "2023-10-18T18:18:25Z", - "updated_at": "2023-10-18T18:18:25Z", - "pushed_at": "2023-10-18T18:29:41Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-45992.json b/2023/CVE-2023-45992.json deleted file mode 100644 index a0db62d93e..0000000000 --- a/2023/CVE-2023-45992.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 707284838, - "name": "CVE-2023-45992", - "full_name": "harry935\/CVE-2023-45992", - "owner": { - "login": "harry935", - "id": 2310647, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2310647?v=4", - "html_url": "https:\/\/github.com\/harry935", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/harry935\/CVE-2023-45992", - "description": null, - "fork": false, - "created_at": "2023-10-19T15:26:59Z", - "updated_at": "2023-10-19T15:27:00Z", - "pushed_at": "2023-10-19T15:45:59Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-46003.json b/2023/CVE-2023-46003.json deleted file mode 100644 index b2f48ee1f1..0000000000 --- a/2023/CVE-2023-46003.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 707100656, - "name": "CVE-2023-46003", - "full_name": "leekenghwa\/CVE-2023-46003", - "owner": { - "login": "leekenghwa", - "id": 45155253, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45155253?v=4", - "html_url": "https:\/\/github.com\/leekenghwa", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/leekenghwa\/CVE-2023-46003", - "description": null, - "fork": false, - "created_at": "2023-10-19T08:17:53Z", - "updated_at": "2023-10-19T08:17:54Z", - "pushed_at": "2023-10-20T01:07:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-4863.json b/2023/CVE-2023-4863.json index 607ef3e286..5e56fe4f92 100644 --- a/2023/CVE-2023-4863.json +++ b/2023/CVE-2023-4863.json @@ -154,37 +154,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 700661789, - "name": "libwebp-checker", - "full_name": "murphysecurity\/libwebp-checker", - "owner": { - "login": "murphysecurity", - "id": 101661127, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101661127?v=4", - "html_url": "https:\/\/github.com\/murphysecurity", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/murphysecurity\/libwebp-checker", - "description": "A tool for finding vulnerable libwebp(CVE-2023-4863)", - "fork": false, - "created_at": "2023-10-05T03:28:23Z", - "updated_at": "2024-02-20T11:53:27Z", - "pushed_at": "2023-10-07T02:52:10Z", - "stargazers_count": 21, - "watchers_count": 21, - "has_discussions": false, - "forks_count": 11, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 11, - "watchers": 21, - "score": 0, - "subscribers_count": 6 - }, { "id": 717339904, "name": "CVE-2023-4863", @@ -231,10 +200,10 @@ "description": null, "fork": false, "created_at": "2023-12-18T23:12:25Z", - "updated_at": "2024-12-21T01:54:59Z", + "updated_at": "2024-12-28T12:49:29Z", "pushed_at": "2024-05-13T17:40:58Z", - "stargazers_count": 47, - "watchers_count": 47, + "stargazers_count": 46, + "watchers_count": 46, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -243,7 +212,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 47, + "watchers": 46, "score": 0, "subscribers_count": 3 }, diff --git a/2023/CVE-2023-4911.json b/2023/CVE-2023-4911.json index 9ea5d4308b..0841b790e6 100644 --- a/2023/CVE-2023-4911.json +++ b/2023/CVE-2023-4911.json @@ -1,225 +1,4 @@ [ - { - "id": 700333818, - "name": "CVE-2023-4911", - "full_name": "Green-Avocado\/CVE-2023-4911", - "owner": { - "login": "Green-Avocado", - "id": 58372700, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58372700?v=4", - "html_url": "https:\/\/github.com\/Green-Avocado", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Green-Avocado\/CVE-2023-4911", - "description": "https:\/\/www.qualys.com\/2023\/10\/03\/cve-2023-4911\/looney-tunables-local-privilege-escalation-glibc-ld-so.txt", - "fork": false, - "created_at": "2023-10-04T11:58:58Z", - "updated_at": "2023-10-10T12:53:31Z", - "pushed_at": "2023-10-05T20:48:46Z", - "stargazers_count": 14, - "watchers_count": 14, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 3, - "watchers": 14, - "score": 0, - "subscribers_count": 2 - }, - { - "id": 700394746, - "name": "CVE-2023-4911", - "full_name": "leesh3288\/CVE-2023-4911", - "owner": { - "login": "leesh3288", - "id": 17825906, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17825906?v=4", - "html_url": "https:\/\/github.com\/leesh3288", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/leesh3288\/CVE-2023-4911", - "description": "PoC for CVE-2023-4911", - "fork": false, - "created_at": "2023-10-04T14:12:16Z", - "updated_at": "2024-12-22T00:22:49Z", - "pushed_at": "2023-10-04T14:16:36Z", - "stargazers_count": 381, - "watchers_count": 381, - "has_discussions": false, - "forks_count": 58, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 58, - "watchers": 381, - "score": 0, - "subscribers_count": 5 - }, - { - "id": 700404689, - "name": "CVE-2023-4911", - "full_name": "RickdeJager\/CVE-2023-4911", - "owner": { - "login": "RickdeJager", - "id": 29239050, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29239050?v=4", - "html_url": "https:\/\/github.com\/RickdeJager", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RickdeJager\/CVE-2023-4911", - "description": "CVE-2023-4911 proof of concept", - "fork": false, - "created_at": "2023-10-04T14:32:49Z", - "updated_at": "2024-12-27T14:00:23Z", - "pushed_at": "2023-10-08T23:24:24Z", - "stargazers_count": 165, - "watchers_count": 165, - "has_discussions": false, - "forks_count": 31, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 31, - "watchers": 165, - "score": 0, - "subscribers_count": 5 - }, - { - "id": 701947383, - "name": "CVE-2023-4911", - "full_name": "xiaoQ1z\/CVE-2023-4911", - "owner": { - "login": "xiaoQ1z", - "id": 20059156, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20059156?v=4", - "html_url": "https:\/\/github.com\/xiaoQ1z", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/xiaoQ1z\/CVE-2023-4911", - "description": null, - "fork": false, - "created_at": "2023-10-08T03:26:24Z", - "updated_at": "2023-10-08T03:30:00Z", - "pushed_at": "2023-10-08T03:28:11Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 4, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 4, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 703037275, - "name": "looney-tuneables", - "full_name": "silent6trinity\/looney-tuneables", - "owner": { - "login": "silent6trinity", - "id": 78173918, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78173918?v=4", - "html_url": "https:\/\/github.com\/silent6trinity", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/silent6trinity\/looney-tuneables", - "description": "CVE-2023-4911", - "fork": false, - "created_at": "2023-10-10T13:29:11Z", - "updated_at": "2023-10-10T13:30:33Z", - "pushed_at": "2023-10-10T13:32:30Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 703246649, - "name": "looney-tunables-CVE-2023-4911", - "full_name": "hadrian3689\/looney-tunables-CVE-2023-4911", - "owner": { - "login": "hadrian3689", - "id": 71423134, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71423134?v=4", - "html_url": "https:\/\/github.com\/hadrian3689", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/hadrian3689\/looney-tunables-CVE-2023-4911", - "description": null, - "fork": false, - "created_at": "2023-10-10T22:04:23Z", - "updated_at": "2024-12-03T23:08:07Z", - "pushed_at": "2023-10-15T19:37:06Z", - "stargazers_count": 26, - "watchers_count": 26, - "has_discussions": false, - "forks_count": 5, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 5, - "watchers": 26, - "score": 0, - "subscribers_count": 2 - }, - { - "id": 703602936, - "name": "CVE-2023-4911", - "full_name": "ruycr4ft\/CVE-2023-4911", - "owner": { - "login": "ruycr4ft", - "id": 103446004, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103446004?v=4", - "html_url": "https:\/\/github.com\/ruycr4ft", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ruycr4ft\/CVE-2023-4911", - "description": "CVE-2023-4911", - "fork": false, - "created_at": "2023-10-11T14:49:22Z", - "updated_at": "2024-12-05T05:21:18Z", - "pushed_at": "2023-10-11T15:15:18Z", - "stargazers_count": 14, - "watchers_count": 14, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2023-4911", - "linux-privilege-escalation", - "poc" - ], - "visibility": "public", - "forks": 3, - "watchers": 14, - "score": 0, - "subscribers_count": 1 - }, { "id": 704757696, "name": "CVE-2023-4911", @@ -251,37 +30,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 706044499, - "name": "LooneyPwner", - "full_name": "chaudharyarjun\/LooneyPwner", - "owner": { - "login": "chaudharyarjun", - "id": 66072013, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66072013?v=4", - "html_url": "https:\/\/github.com\/chaudharyarjun", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/chaudharyarjun\/LooneyPwner", - "description": "Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.", - "fork": false, - "created_at": "2023-10-17T07:44:16Z", - "updated_at": "2024-11-02T12:18:42Z", - "pushed_at": "2023-10-18T04:59:50Z", - "stargazers_count": 38, - "watchers_count": 38, - "has_discussions": false, - "forks_count": 12, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 12, - "watchers": 38, - "score": 0, - "subscribers_count": 2 - }, { "id": 709787729, "name": "CVE-2023-4911", diff --git a/2023/CVE-2023-50465.json b/2023/CVE-2023-50465.json deleted file mode 100644 index dbc828317e..0000000000 --- a/2023/CVE-2023-50465.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 700635443, - "name": "CVE-2023-50465", - "full_name": "Ev3rR3d\/CVE-2023-50465", - "owner": { - "login": "Ev3rR3d", - "id": 108440914, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108440914?v=4", - "html_url": "https:\/\/github.com\/Ev3rR3d", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Ev3rR3d\/CVE-2023-50465", - "description": null, - "fork": false, - "created_at": "2023-10-05T01:36:08Z", - "updated_at": "2024-01-20T04:15:54Z", - "pushed_at": "2023-10-05T01:41:18Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-5070.json b/2023/CVE-2023-5070.json deleted file mode 100644 index 9ec112ba68..0000000000 --- a/2023/CVE-2023-5070.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 706058561, - "name": "CVE-2023-5070", - "full_name": "RandomRobbieBF\/CVE-2023-5070", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2023-5070", - "description": "Social Media Share Buttons & Social Sharing Icons <= 2.8.5 - Information Exposure", - "fork": false, - "created_at": "2023-10-17T08:19:09Z", - "updated_at": "2024-08-12T20:32:53Z", - "pushed_at": "2023-10-17T08:23:31Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 2 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-5142.json b/2023/CVE-2023-5142.json deleted file mode 100644 index 05762061f9..0000000000 --- a/2023/CVE-2023-5142.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 707145538, - "name": "CVE-H3C-Report", - "full_name": "kuangxiaotu\/CVE-H3C-Report", - "owner": { - "login": "kuangxiaotu", - "id": 99320591, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99320591?v=4", - "html_url": "https:\/\/github.com\/kuangxiaotu", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/kuangxiaotu\/CVE-H3C-Report", - "description": "CVE-2023-5142", - "fork": false, - "created_at": "2023-10-19T10:09:47Z", - "updated_at": "2023-10-19T10:09:47Z", - "pushed_at": "2023-09-08T01:56:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-5217.json b/2023/CVE-2023-5217.json deleted file mode 100644 index 6382b91e76..0000000000 --- a/2023/CVE-2023-5217.json +++ /dev/null @@ -1,95 +0,0 @@ -[ - { - "id": 701187998, - "name": "cve-2023-5217-poc", - "full_name": "UT-Security\/cve-2023-5217-poc", - "owner": { - "login": "UT-Security", - "id": 142931531, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142931531?v=4", - "html_url": "https:\/\/github.com\/UT-Security", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/UT-Security\/cve-2023-5217-poc", - "description": "A PoC to trigger CVE-2023-5217 from the Browser WebCodecs or MediaRecorder interface.", - "fork": false, - "created_at": "2023-10-06T05:46:16Z", - "updated_at": "2024-08-26T17:42:58Z", - "pushed_at": "2023-10-11T04:30:03Z", - "stargazers_count": 15, - "watchers_count": 15, - "has_discussions": false, - "forks_count": 5, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 5, - "watchers": 15, - "score": 0, - "subscribers_count": 4 - }, - { - "id": 701294663, - "name": "platform_external_libvpx_v1.8.0_CVE-2023-5217", - "full_name": "Trinadh465\/platform_external_libvpx_v1.8.0_CVE-2023-5217", - "owner": { - "login": "Trinadh465", - "id": 102574296, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4", - "html_url": "https:\/\/github.com\/Trinadh465", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Trinadh465\/platform_external_libvpx_v1.8.0_CVE-2023-5217", - "description": null, - "fork": false, - "created_at": "2023-10-06T10:43:38Z", - "updated_at": "2023-10-06T10:45:57Z", - "pushed_at": "2023-10-06T10:46:28Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 701301269, - "name": "platform_external_libvpx_v1.4.0_CVE-2023-5217", - "full_name": "Trinadh465\/platform_external_libvpx_v1.4.0_CVE-2023-5217", - "owner": { - "login": "Trinadh465", - "id": 102574296, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4", - "html_url": "https:\/\/github.com\/Trinadh465", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Trinadh465\/platform_external_libvpx_v1.4.0_CVE-2023-5217", - "description": null, - "fork": false, - "created_at": "2023-10-06T11:01:08Z", - "updated_at": "2023-10-06T11:04:35Z", - "pushed_at": "2023-10-06T11:05:11Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-5521.json b/2023/CVE-2023-5521.json deleted file mode 100644 index 2ab113fe6d..0000000000 --- a/2023/CVE-2023-5521.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 703526370, - "name": "CVE-2023-5521", - "full_name": "Ylarod\/CVE-2023-5521", - "owner": { - "login": "Ylarod", - "id": 30978685, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30978685?v=4", - "html_url": "https:\/\/github.com\/Ylarod", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Ylarod\/CVE-2023-5521", - "description": "Root takeover via signature spoofing in KernelSU", - "fork": false, - "created_at": "2023-10-11T12:08:31Z", - "updated_at": "2024-11-26T18:44:53Z", - "pushed_at": "2023-10-11T12:34:37Z", - "stargazers_count": 14, - "watchers_count": 14, - "has_discussions": false, - "forks_count": 6, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 6, - "watchers": 14, - "score": 0, - "subscribers_count": 2 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-5538.json b/2023/CVE-2023-5538.json deleted file mode 100644 index df450a750d..0000000000 --- a/2023/CVE-2023-5538.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 703812630, - "name": "MpOperationLogs", - "full_name": "juweihuitao\/MpOperationLogs", - "owner": { - "login": "juweihuitao", - "id": 110007292, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110007292?v=4", - "html_url": "https:\/\/github.com\/juweihuitao", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/juweihuitao\/MpOperationLogs", - "description": "CVE-2023-5538 - MpOperationLogs <= 1.0.1 - 未经身份验证的存储跨站点脚本", - "fork": false, - "created_at": "2023-10-12T01:15:09Z", - "updated_at": "2023-10-12T01:15:09Z", - "pushed_at": "2023-10-12T01:49:17Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-5539.json b/2023/CVE-2023-5539.json deleted file mode 100644 index 725b8d41d0..0000000000 --- a/2023/CVE-2023-5539.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 706569887, - "name": "CVE-2023-5539", - "full_name": "cli-ish\/CVE-2023-5539", - "owner": { - "login": "cli-ish", - "id": 22986332, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22986332?v=4", - "html_url": "https:\/\/github.com\/cli-ish", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/cli-ish\/CVE-2023-5539", - "description": null, - "fork": false, - "created_at": "2023-10-18T07:58:25Z", - "updated_at": "2023-10-18T07:58:25Z", - "pushed_at": "2023-10-18T07:58:25Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-5540.json b/2023/CVE-2023-5540.json deleted file mode 100644 index a3d34315d5..0000000000 --- a/2023/CVE-2023-5540.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 706569939, - "name": "CVE-2023-5540", - "full_name": "cli-ish\/CVE-2023-5540", - "owner": { - "login": "cli-ish", - "id": 22986332, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22986332?v=4", - "html_url": "https:\/\/github.com\/cli-ish", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/cli-ish\/CVE-2023-5540", - "description": null, - "fork": false, - "created_at": "2023-10-18T07:58:33Z", - "updated_at": "2023-10-18T07:58:33Z", - "pushed_at": "2023-10-18T07:58:33Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-6319.json b/2023/CVE-2023-6319.json index d402bb0ac7..5310419a5d 100644 --- a/2023/CVE-2023-6319.json +++ b/2023/CVE-2023-6319.json @@ -14,10 +14,10 @@ "description": "CVE-2023-6319 proof of concept", "fork": false, "created_at": "2024-04-11T18:58:17Z", - "updated_at": "2024-12-14T07:45:13Z", + "updated_at": "2024-12-28T18:00:51Z", "pushed_at": "2024-10-17T11:18:46Z", - "stargazers_count": 37, - "watchers_count": 37, + "stargazers_count": 38, + "watchers_count": 38, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 4, - "watchers": 37, + "watchers": 38, "score": 0, "subscribers_count": 5 } diff --git a/2024/CVE-2024-11972.json b/2024/CVE-2024-11972.json index 442ba4a497..df9469e1ce 100644 --- a/2024/CVE-2024-11972.json +++ b/2024/CVE-2024-11972.json @@ -14,8 +14,8 @@ "description": "Exploit for CVE-2024-11972, Hunk Companion < 1.9.0 Unauthenticated Plugin Installation", "fork": false, "created_at": "2024-12-15T23:54:15Z", - "updated_at": "2024-12-18T07:17:04Z", - "pushed_at": "2024-12-18T07:17:01Z", + "updated_at": "2024-12-28T16:44:18Z", + "pushed_at": "2024-12-28T16:44:15Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2024/CVE-2024-20137.json b/2024/CVE-2024-20137.json index 2ae1333faa..0d848ffff4 100644 --- a/2024/CVE-2024-20137.json +++ b/2024/CVE-2024-20137.json @@ -14,10 +14,10 @@ "description": "Python code for expoiting of vulnerability in wlan driver of MediaTek SOCs MT6890, MT7622, MT7915, MT7916, MT7981, MT7986", "fork": false, "created_at": "2024-12-25T15:01:38Z", - "updated_at": "2024-12-25T16:57:37Z", + "updated_at": "2024-12-28T16:47:15Z", "pushed_at": "2024-12-25T16:57:34Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-20356.json b/2024/CVE-2024-20356.json index cd7be038f0..085e7c46ea 100644 --- a/2024/CVE-2024-20356.json +++ b/2024/CVE-2024-20356.json @@ -14,10 +14,10 @@ "description": "This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.", "fork": false, "created_at": "2024-04-12T15:07:42Z", - "updated_at": "2024-12-25T07:57:40Z", + "updated_at": "2024-12-28T12:57:02Z", "pushed_at": "2024-04-18T14:31:34Z", - "stargazers_count": 56, - "watchers_count": 56, + "stargazers_count": 55, + "watchers_count": 55, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 11, - "watchers": 56, + "watchers": 55, "score": 0, "subscribers_count": 8 }, diff --git a/2024/CVE-2024-21762.json b/2024/CVE-2024-21762.json index 918981da8a..5ecaaf4fc5 100644 --- a/2024/CVE-2024-21762.json +++ b/2024/CVE-2024-21762.json @@ -76,10 +76,10 @@ "description": "out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability ", "fork": false, "created_at": "2024-03-13T09:17:28Z", - "updated_at": "2024-12-26T06:23:07Z", + "updated_at": "2024-12-28T14:37:25Z", "pushed_at": "2024-03-16T00:35:12Z", - "stargazers_count": 127, - "watchers_count": 127, + "stargazers_count": 128, + "watchers_count": 128, "has_discussions": false, "forks_count": 20, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 20, - "watchers": 127, + "watchers": 128, "score": 0, "subscribers_count": 5 }, diff --git a/2024/CVE-2024-27956.json b/2024/CVE-2024-27956.json index 67c8533f2b..3e7ebb218f 100644 --- a/2024/CVE-2024-27956.json +++ b/2024/CVE-2024-27956.json @@ -169,10 +169,10 @@ "description": "WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target server. It utilizes the wp-automatic plugin's CSV injection vulnerability to execute SQL queries", "fork": false, "created_at": "2024-05-14T14:21:49Z", - "updated_at": "2024-12-18T20:10:37Z", + "updated_at": "2024-12-28T13:08:11Z", "pushed_at": "2024-07-01T09:29:02Z", - "stargazers_count": 94, - "watchers_count": 94, + "stargazers_count": 95, + "watchers_count": 95, "has_discussions": false, "forks_count": 23, "allow_forking": true, @@ -201,7 +201,7 @@ ], "visibility": "public", "forks": 23, - "watchers": 94, + "watchers": 95, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-2961.json b/2024/CVE-2024-2961.json index 6019015d08..eeae681662 100644 --- a/2024/CVE-2024-2961.json +++ b/2024/CVE-2024-2961.json @@ -81,13 +81,13 @@ "stargazers_count": 426, "watchers_count": 426, "has_discussions": false, - "forks_count": 52, + "forks_count": 53, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 52, + "forks": 53, "watchers": 426, "score": 0, "subscribers_count": 8 diff --git a/2024/CVE-2024-30051.json b/2024/CVE-2024-30051.json index eb6de8c355..acaad3cc46 100644 --- a/2024/CVE-2024-30051.json +++ b/2024/CVE-2024-30051.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2024-08-14T16:20:38Z", - "updated_at": "2024-12-26T12:51:07Z", + "updated_at": "2024-12-28T12:37:03Z", "pushed_at": "2024-09-05T23:21:00Z", - "stargazers_count": 113, - "watchers_count": 113, + "stargazers_count": 112, + "watchers_count": 112, "has_discussions": false, "forks_count": 33, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 33, - "watchers": 113, + "watchers": 112, "score": 0, "subscribers_count": 3 } diff --git a/2024/CVE-2024-3094.json b/2024/CVE-2024-3094.json index cbd7c9d87f..d8bfd7fc06 100644 --- a/2024/CVE-2024-3094.json +++ b/2024/CVE-2024-3094.json @@ -952,10 +952,10 @@ "description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)", "fork": false, "created_at": "2024-04-01T14:28:09Z", - "updated_at": "2024-12-28T03:44:43Z", + "updated_at": "2024-12-28T14:08:32Z", "pushed_at": "2024-04-03T04:58:50Z", - "stargazers_count": 3503, - "watchers_count": 3503, + "stargazers_count": 3502, + "watchers_count": 3502, "has_discussions": false, "forks_count": 240, "allow_forking": true, @@ -964,7 +964,7 @@ "topics": [], "visibility": "public", "forks": 240, - "watchers": 3503, + "watchers": 3502, "score": 0, "subscribers_count": 38 }, diff --git a/2024/CVE-2024-38077.json b/2024/CVE-2024-38077.json index e517dcf21b..6c0300b5cd 100644 --- a/2024/CVE-2024-38077.json +++ b/2024/CVE-2024-38077.json @@ -138,10 +138,10 @@ "description": "CVE-2024-38077,本仓库仅用作备份,", "fork": false, "created_at": "2024-08-09T07:46:09Z", - "updated_at": "2024-08-18T17:48:39Z", + "updated_at": "2024-12-28T12:45:06Z", "pushed_at": "2024-08-09T07:45:58Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -150,7 +150,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 5, + "watchers": 4, "score": 0, "subscribers_count": 0 }, diff --git a/2024/CVE-2024-40711.json b/2024/CVE-2024-40711.json index 5ef88bebd1..72ca90b053 100644 --- a/2024/CVE-2024-40711.json +++ b/2024/CVE-2024-40711.json @@ -14,10 +14,10 @@ "description": "Pre-Auth Exploit for CVE-2024-40711", "fork": false, "created_at": "2024-09-15T17:25:32Z", - "updated_at": "2024-12-11T01:25:10Z", + "updated_at": "2024-12-28T12:35:22Z", "pushed_at": "2024-09-15T17:28:41Z", - "stargazers_count": 39, - "watchers_count": 39, + "stargazers_count": 38, + "watchers_count": 38, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 11, - "watchers": 39, + "watchers": 38, "score": 0, "subscribers_count": 0 }, diff --git a/2024/CVE-2024-44193.json b/2024/CVE-2024-44193.json index 3d361f91d0..12e1cddd39 100644 --- a/2024/CVE-2024-44193.json +++ b/2024/CVE-2024-44193.json @@ -14,10 +14,10 @@ "description": "Hacking Windows through iTunes  - Local Privilege Escalation 0-day", "fork": false, "created_at": "2024-10-04T14:20:15Z", - "updated_at": "2024-12-07T09:32:19Z", + "updated_at": "2024-12-28T12:40:31Z", "pushed_at": "2024-10-04T14:59:50Z", - "stargazers_count": 94, - "watchers_count": 94, + "stargazers_count": 93, + "watchers_count": 93, "has_discussions": false, "forks_count": 13, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 13, - "watchers": 94, + "watchers": 93, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-4883.json b/2024/CVE-2024-4883.json index 8746144e97..e8d86a72bc 100644 --- a/2024/CVE-2024-4883.json +++ b/2024/CVE-2024-4883.json @@ -14,10 +14,10 @@ "description": "Exploit for CVE-2024-4883", "fork": false, "created_at": "2024-07-08T12:14:01Z", - "updated_at": "2024-11-20T16:30:55Z", + "updated_at": "2024-12-28T12:42:55Z", "pushed_at": "2024-07-08T12:14:18Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 9, + "watchers_count": 9, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 10, + "watchers": 9, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-4885.json b/2024/CVE-2024-4885.json index 161fe3556b..b00b0c0a61 100644 --- a/2024/CVE-2024-4885.json +++ b/2024/CVE-2024-4885.json @@ -14,10 +14,10 @@ "description": "Exploit for CVE-2024-4885", "fork": false, "created_at": "2024-07-08T12:14:42Z", - "updated_at": "2024-11-29T09:48:27Z", + "updated_at": "2024-12-28T12:42:54Z", "pushed_at": "2024-07-08T12:15:00Z", - "stargazers_count": 16, - "watchers_count": 16, + "stargazers_count": 15, + "watchers_count": 15, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 16, + "watchers": 15, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-48990.json b/2024/CVE-2024-48990.json index c4a77f020e..acae2831a7 100644 --- a/2024/CVE-2024-48990.json +++ b/2024/CVE-2024-48990.json @@ -14,10 +14,10 @@ "description": "PoC for CVE-2024-48990", "fork": false, "created_at": "2024-11-20T18:41:25Z", - "updated_at": "2024-12-27T17:33:05Z", + "updated_at": "2024-12-28T13:23:39Z", "pushed_at": "2024-11-20T18:49:33Z", - "stargazers_count": 93, - "watchers_count": 93, + "stargazers_count": 92, + "watchers_count": 92, "has_discussions": false, "forks_count": 18, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 18, - "watchers": 93, + "watchers": 92, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-5009.json b/2024/CVE-2024-5009.json index 676a0216bc..cfdca7b749 100644 --- a/2024/CVE-2024-5009.json +++ b/2024/CVE-2024-5009.json @@ -14,10 +14,10 @@ "description": "Exploit for CVE-2024-5009", "fork": false, "created_at": "2024-07-08T12:15:29Z", - "updated_at": "2024-11-20T16:30:55Z", + "updated_at": "2024-12-28T12:42:58Z", "pushed_at": "2024-07-08T12:15:41Z", - "stargazers_count": 13, - "watchers_count": 13, + "stargazers_count": 12, + "watchers_count": 12, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 13, + "watchers": 12, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-50379.json b/2024/CVE-2024-50379.json index 98fd813f1b..8826937a79 100644 --- a/2024/CVE-2024-50379.json +++ b/2024/CVE-2024-50379.json @@ -262,19 +262,19 @@ "description": "CVE-2024-50379-exp", "fork": false, "created_at": "2024-12-25T02:41:31Z", - "updated_at": "2024-12-28T06:28:45Z", + "updated_at": "2024-12-28T16:24:51Z", "pushed_at": "2024-12-26T08:52:15Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, - "watchers": 3, + "forks": 2, + "watchers": 4, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-6387.json b/2024/CVE-2024-6387.json index e30b7e362b..100b5bc3c9 100644 --- a/2024/CVE-2024-6387.json +++ b/2024/CVE-2024-6387.json @@ -274,7 +274,7 @@ "stargazers_count": 461, "watchers_count": 461, "has_discussions": false, - "forks_count": 89, + "forks_count": 90, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -286,7 +286,7 @@ "redteam" ], "visibility": "public", - "forks": 89, + "forks": 90, "watchers": 461, "score": 0, "subscribers_count": 7 diff --git a/2024/CVE-2024-6670.json b/2024/CVE-2024-6670.json index 6c1a51fba0..98e13f9539 100644 --- a/2024/CVE-2024-6670.json +++ b/2024/CVE-2024-6670.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2024-08-30T17:13:14Z", - "updated_at": "2024-12-11T17:50:10Z", + "updated_at": "2024-12-28T12:42:48Z", "pushed_at": "2024-08-30T17:22:31Z", - "stargazers_count": 34, - "watchers_count": 34, + "stargazers_count": 33, + "watchers_count": 33, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 34, + "watchers": 33, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-8069.json b/2024/CVE-2024-8069.json index c2d7dfa1dc..eace3cf82b 100644 --- a/2024/CVE-2024-8069.json +++ b/2024/CVE-2024-8069.json @@ -14,10 +14,10 @@ "description": "Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE", "fork": false, "created_at": "2024-11-13T02:50:56Z", - "updated_at": "2024-12-28T07:43:14Z", + "updated_at": "2024-12-28T15:47:34Z", "pushed_at": "2024-11-29T03:02:09Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 4, + "watchers": 7, "score": 0, "subscribers_count": 0 } diff --git a/README.md b/README.md index a05e32db16..4865e262e7 100644 --- a/README.md +++ b/README.md @@ -8059,7 +8059,6 @@ - [Chocapikk/CVE-2023-1698](https://github.com/Chocapikk/CVE-2023-1698) -- [deIndra/CVE-2023-1698](https://github.com/deIndra/CVE-2023-1698) - [thedarknessdied/WAGO-CVE-2023-1698](https://github.com/thedarknessdied/WAGO-CVE-2023-1698) ### CVE-2023-1718 (2023-11-01) @@ -8165,13 +8164,6 @@ - [letsr00t/CVE-2023-2163](https://github.com/letsr00t/CVE-2023-2163) -### CVE-2023-2215 (2023-04-21) - -Es wurde eine kritische Schwachstelle in Campcodes Coffee Shop POS System 1.0 entdeckt. Es betrifft eine unbekannte Funktion der Datei /admin/user/manage_user.php. Mittels Manipulieren des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung. - - -- [zwxxb/CVE-2023-2215](https://github.com/zwxxb/CVE-2023-2215) - ### CVE-2023-2249 (2023-06-09) The wpForo Forum plugin for WordPress is vulnerable to Local File Include, Server-Side Request Forgery, and PHAR Deserialization in versions up to, and including, 2.1.7. This is due to the insecure use of file_get_contents without appropriate verification of the data being supplied to the function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to retrieve the contents of files like wp-config.php hosted on the system, perform a deserialization attack and possibly achieve remote code execution, and make requests to internal services. @@ -8267,7 +8259,6 @@ - [OllaPapito/gameoverlay](https://github.com/OllaPapito/gameoverlay) - [luanoliveira350/GameOverlayFS](https://github.com/luanoliveira350/GameOverlayFS) -- [g1vi/CVE-2023-2640-CVE-2023-32629](https://github.com/g1vi/CVE-2023-2640-CVE-2023-32629) - [musorblyat/CVE-2023-2640-CVE-2023-32629](https://github.com/musorblyat/CVE-2023-2640-CVE-2023-32629) - [SanjayRagavendar/Ubuntu-GameOver-Lay](https://github.com/SanjayRagavendar/Ubuntu-GameOver-Lay) - [Nkipohcs/CVE-2023-2640-CVE-2023-32629](https://github.com/Nkipohcs/CVE-2023-2640-CVE-2023-32629) @@ -8359,13 +8350,6 @@ - [d0rb/CVE-2023-2916](https://github.com/d0rb/CVE-2023-2916) -### CVE-2023-2928 (2023-05-27) - -In DedeCMS bis 5.7.106 wurde eine kritische Schwachstelle ausgemacht. Dabei geht es um eine nicht genauer bekannte Funktion der Datei uploads/dede/article_allowurl_edit.php. Durch das Manipulieren des Arguments allurls mit unbekannten Daten kann eine code injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung. - - -- [CN016/DedeCMS-getshell-CVE-2023-2928-](https://github.com/CN016/DedeCMS-getshell-CVE-2023-2928-) - ### CVE-2023-2951 (2023-05-28) Es wurde eine kritische Schwachstelle in code-projects Bus Dispatch and Information System 1.0 entdeckt. Es geht dabei um eine nicht klar definierte Funktion der Datei delete_bus.php. Durch die Manipulation des Arguments busid mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung. @@ -8607,13 +8591,6 @@ - [mvpyyds/CVE-2023-4166](https://github.com/mvpyyds/CVE-2023-4166) -### CVE-2023-4169 (2023-08-05) - -In Ruijie RG-EW1200G 1.0(1)B1P5 wurde eine kritische Schwachstelle ausgemacht. Es geht um eine nicht näher bekannte Funktion der Datei /api/sys/set_passwd der Komponente Administrator Password Handler. Durch Manipulation mit unbekannten Daten kann eine improper access controls-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung. - - -- [thedarknessdied/CVE-2023-4169_CVE-2023-3306_CVE-2023-4415](https://github.com/thedarknessdied/CVE-2023-4169_CVE-2023-3306_CVE-2023-4415) - ### CVE-2023-4174 (2023-08-06) In mooSocial mooStore 3.1.6 wurde eine Schwachstelle gefunden. Sie wurde als problematisch eingestuft. Hierbei betrifft es unbekannten Programmcode. Mittels Manipulieren mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. @@ -8878,7 +8855,6 @@ - [talbeerysec/BAD-WEBP-CVE-2023-4863](https://github.com/talbeerysec/BAD-WEBP-CVE-2023-4863) - [OITApps/Find-VulnerableElectronVersion](https://github.com/OITApps/Find-VulnerableElectronVersion) - [GTGalaxi/ElectronVulnerableVersion](https://github.com/GTGalaxi/ElectronVulnerableVersion) -- [murphysecurity/libwebp-checker](https://github.com/murphysecurity/libwebp-checker) - [huiwen-yayaya/CVE-2023-4863](https://github.com/huiwen-yayaya/CVE-2023-4863) - [LiveOverflow/webp-CVE-2023-4863](https://github.com/LiveOverflow/webp-CVE-2023-4863) - [caoweiquan322/NotEnough](https://github.com/caoweiquan322/NotEnough) @@ -8890,15 +8866,7 @@ A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges. -- [Green-Avocado/CVE-2023-4911](https://github.com/Green-Avocado/CVE-2023-4911) -- [leesh3288/CVE-2023-4911](https://github.com/leesh3288/CVE-2023-4911) -- [RickdeJager/CVE-2023-4911](https://github.com/RickdeJager/CVE-2023-4911) -- [xiaoQ1z/CVE-2023-4911](https://github.com/xiaoQ1z/CVE-2023-4911) -- [silent6trinity/looney-tuneables](https://github.com/silent6trinity/looney-tuneables) -- [hadrian3689/looney-tunables-CVE-2023-4911](https://github.com/hadrian3689/looney-tunables-CVE-2023-4911) -- [ruycr4ft/CVE-2023-4911](https://github.com/ruycr4ft/CVE-2023-4911) - [guffre/CVE-2023-4911](https://github.com/guffre/CVE-2023-4911) -- [chaudharyarjun/LooneyPwner](https://github.com/chaudharyarjun/LooneyPwner) - [KernelKrise/CVE-2023-4911](https://github.com/KernelKrise/CVE-2023-4911) - [Diego-AltF4/CVE-2023-4911](https://github.com/Diego-AltF4/CVE-2023-4911) - [teraGL/looneyCVE](https://github.com/teraGL/looneyCVE) @@ -8950,13 +8918,6 @@ - [4ARMED/cve-2023-5044](https://github.com/4ARMED/cve-2023-5044) - [KubernetesBachelor/CVE-2023-5044](https://github.com/KubernetesBachelor/CVE-2023-5044) -### CVE-2023-5070 (2023-10-20) - -The Social Media Share Buttons & Social Sharing Icons plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 2.8.5 via the sfsi_save_export function. This can allow subscribers to export plugin settings that include social media authentication tokens and secrets as well as app passwords. - - -- [RandomRobbieBF/CVE-2023-5070](https://github.com/RandomRobbieBF/CVE-2023-5070) - ### CVE-2023-5089 (2023-10-16) The Defender Security WordPress plugin before 4.1.0 does not prevent redirects to the login page via the auth_redirect WordPress function, allowing an unauthenticated visitor to access the login page, even when the hide login page functionality of the plugin is enabled. @@ -8964,13 +8925,6 @@ - [Cappricio-Securities/CVE-2023-5089](https://github.com/Cappricio-Securities/CVE-2023-5089) -### CVE-2023-5142 (2023-09-24) - -In H3C GR-1100-P, GR-1108-P, GR-1200W, GR-1800AX, GR-2200, GR-3200, GR-5200, GR-8300, ER2100n, ER2200G2, ER3200G2, ER3260G2, ER5100G2, ER5200G2 and ER6300G2 bis 20230908 wurde eine Schwachstelle entdeckt. Sie wurde als problematisch eingestuft. Dabei geht es um eine nicht genauer bekannte Funktion der Datei /userLogin.asp der Komponente Config File Handler. Durch das Beeinflussen mit unbekannten Daten kann eine path traversal-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Die Komplexität eines Angriffs ist eher hoch. Das Ausnutzen gilt als schwierig. Der Exploit steht zur öffentlichen Verfügung. - - -- [kuangxiaotu/CVE-H3C-Report](https://github.com/kuangxiaotu/CVE-H3C-Report) - ### CVE-2023-5178 (2023-11-01) A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe/TCP subsystem in the Linux kernel. This issue may allow a malicious user to cause a use-after-free and double-free problem, which may permit remote code execution or lead to local privilege escalation. @@ -8985,15 +8939,6 @@ - [RandomRobbieBF/CVE-2023-5204](https://github.com/RandomRobbieBF/CVE-2023-5204) -### CVE-2023-5217 (2023-09-28) - -Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) - - -- [UT-Security/cve-2023-5217-poc](https://github.com/UT-Security/cve-2023-5217-poc) -- [Trinadh465/platform_external_libvpx_v1.8.0_CVE-2023-5217](https://github.com/Trinadh465/platform_external_libvpx_v1.8.0_CVE-2023-5217) -- [Trinadh465/platform_external_libvpx_v1.4.0_CVE-2023-5217](https://github.com/Trinadh465/platform_external_libvpx_v1.4.0_CVE-2023-5217) - ### CVE-2023-5324 (2023-10-01) In eeroOS bis 6.16.4-11 wurde eine kritische Schwachstelle gefunden. Hierbei betrifft es unbekannten Programmcode der Komponente Ethernet Interface. Durch die Manipulation mit unbekannten Daten kann eine denial of service-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff im lokalen Netzwerk. Der Exploit steht zur öffentlichen Verfügung. @@ -9021,34 +8966,6 @@ - [RandomRobbieBF/CVE-2023-5412](https://github.com/RandomRobbieBF/CVE-2023-5412) -### CVE-2023-5521 (2023-10-11) - -Incorrect Authorization in GitHub repository tiann/kernelsu prior to v0.6.9. - - -- [Ylarod/CVE-2023-5521](https://github.com/Ylarod/CVE-2023-5521) - -### CVE-2023-5538 (2023-10-18) - -The MpOperationLogs plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the IP Request Headers in versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. - - -- [juweihuitao/MpOperationLogs](https://github.com/juweihuitao/MpOperationLogs) - -### CVE-2023-5539 (2023-11-09) - -A remote code execution risk was identified in the Lesson activity. By default this was only available to teachers and managers. - - -- [cli-ish/CVE-2023-5539](https://github.com/cli-ish/CVE-2023-5539) - -### CVE-2023-5540 (2023-11-09) - -A remote code execution risk was identified in the IMSCP activity. By default this was only available to teachers and managers. - - -- [cli-ish/CVE-2023-5540](https://github.com/cli-ish/CVE-2023-5540) - ### CVE-2023-5546 (2023-11-09) ID numbers displayed in the quiz grading report required additional sanitizing to prevent a stored XSS risk. @@ -9404,15 +9321,10 @@ Cisco is providing an update for the ongoing investigation into observed exploitation of the web UI feature in Cisco IOS XE Software. We are updating the list of fixed releases and adding the Software Checker. Our investigation has determined that the actors exploited two previously unknown issues. The attacker first exploited CVE-2023-20198 to gain initial access and issued a privilege 15 command to create a local user and password combination. This allowed the user to log in with normal user access. The attacker then exploited another component of the web UI feature, leveraging the new local user to elevate privilege to root and write the implant to the file system. Cisco has assigned CVE-2023-20273 to this issue. CVE-2023-20198 has been assigned a CVSS Score of 10.0. CVE-2023-20273 has been assigned a CVSS Score of 7.2. Both of these CVEs are being tracked by CSCwh87343. -- [raystr-atearedteam/CVE-2023-20198-checker](https://github.com/raystr-atearedteam/CVE-2023-20198-checker) - [Atea-Redteam/CVE-2023-20198](https://github.com/Atea-Redteam/CVE-2023-20198) - [securityphoenix/cisco-CVE-2023-20198-tester](https://github.com/securityphoenix/cisco-CVE-2023-20198-tester) -- [emomeni/Simple-Ansible-for-CVE-2023-20198](https://github.com/emomeni/Simple-Ansible-for-CVE-2023-20198) - [ZephrFish/CVE-2023-20198-Checker](https://github.com/ZephrFish/CVE-2023-20198-Checker) -- [JoyGhoshs/CVE-2023-20198](https://github.com/JoyGhoshs/CVE-2023-20198) -- [Tounsi007/CVE-2023-20198](https://github.com/Tounsi007/CVE-2023-20198) - [alekos3/CVE_2023_20198_Detector](https://github.com/alekos3/CVE_2023_20198_Detector) -- [reket99/Cisco_CVE-2023-20198](https://github.com/reket99/Cisco_CVE-2023-20198) - [iveresk/cve-2023-20198](https://github.com/iveresk/cve-2023-20198) - [sohaibeb/CVE-2023-20198](https://github.com/sohaibeb/CVE-2023-20198) - [fox-it/cisco-ios-xe-implant-detection](https://github.com/fox-it/cisco-ios-xe-implant-detection) @@ -9512,14 +9424,6 @@ - [Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-20911](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-20911) -### CVE-2023-20918 (2023-07-12) - -In getPendingIntentLaunchFlags of ActivityOptions.java, there is a possible elevation of privilege due to a confused deputy with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n - - -- [pazhanivel07/platform_frameworks_base_AOSP_10_r33_CVE-2023-20918](https://github.com/pazhanivel07/platform_frameworks_base_AOSP_10_r33_CVE-2023-20918) -- [Trinadh465/platform_frameworks_base_CVE-2023-20918](https://github.com/Trinadh465/platform_frameworks_base_CVE-2023-20918) - ### CVE-2023-20921 (2023-01-24) In onPackageRemoved of AccessibilityManagerService.java, there is a possibility to automatically grant accessibility services due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-243378132 @@ -9630,64 +9534,20 @@ - [hshivhare67/Framework_base_AOSP10_r33_CVE-2023-21144_old](https://github.com/hshivhare67/Framework_base_AOSP10_r33_CVE-2023-21144_old) - [hshivhare67/Framework_base_AOSP10_r33_CVE-2023-21144](https://github.com/hshivhare67/Framework_base_AOSP10_r33_CVE-2023-21144) -### CVE-2023-21238 (2023-07-12) - -In visitUris of RemoteViews.java, there is a possible leak of images between users due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n - - -- [Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-21238](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-21238) - -### CVE-2023-21246 (2023-07-12) - -In ShortcutInfo of ShortcutInfo.java, there is a possible way for an app to retain notification listening access due to an uncaught exception. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n - - -- [Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-21246](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-21246) - -### CVE-2023-21251 (2023-07-12) - -In onCreate of ConfirmDialog.java, there is a possible way to connect to VNP bypassing user's consent due to improper input validation. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.\n\n - - -- [Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-21251](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-21251) - ### CVE-2023-21272 (2023-08-14) In readFrom of Uri.java, there is a possible bad URI permission grant due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n - [Trinadh465/frameworks_base_AOSP-4.2.2_r1_CVE-2023-21272](https://github.com/Trinadh465/frameworks_base_AOSP-4.2.2_r1_CVE-2023-21272) -- [pazhanivel07/platform_frameworks_base_AOSP_10_r33_CVE-2023-21272](https://github.com/pazhanivel07/platform_frameworks_base_AOSP_10_r33_CVE-2023-21272) - -### CVE-2023-21275 (2023-08-14) - -In decideCancelProvisioningDialog of AdminIntegratedFlowPrepareActivity.java, there is a possible way to bypass factory reset protections due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n - - -- [Trinadh465/packages_apps_ManagedProvisioning_AOSP10_r33_CVE-2023-21275](https://github.com/Trinadh465/packages_apps_ManagedProvisioning_AOSP10_r33_CVE-2023-21275) - -### CVE-2023-21281 (2023-08-14) - -In multiple functions of KeyguardViewMediator.java, there is a possible failure to lock after screen timeout due to a logic error in the code. This could lead to local escalation of privilege across users with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n - - -- [Trinadh465/platform_frameworks_base_CVE-2023-21281](https://github.com/Trinadh465/platform_frameworks_base_CVE-2023-21281) ### CVE-2023-21282 (2023-08-14) In TRANSPOSER_SETTINGS of lpp_tran.h, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.\n\n -- [Trinadh465/external_aac_AOSP10_r33_CVE-2023-21282](https://github.com/Trinadh465/external_aac_AOSP10_r33_CVE-2023-21282) - [Trinadh465/external_aac_android-4.2.2_r1_CVE-2023-21282](https://github.com/Trinadh465/external_aac_android-4.2.2_r1_CVE-2023-21282) -### CVE-2023-21284 (2023-08-14) - -In multiple functions of DevicePolicyManager.java, there is a possible way to prevent enabling the Find my Device feature due to improper input validation. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation.\n\n - - -- [Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-21284](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-21284) - ### CVE-2023-21285 (2023-08-14) In setMetadata of MediaSessionRecord.java, there is a possible way to view another user's images due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n @@ -9695,20 +9555,6 @@ - [uthrasri/framework_base_CVE-2023-21285_NoPatch](https://github.com/uthrasri/framework_base_CVE-2023-21285_NoPatch) -### CVE-2023-21286 (2023-08-14) - -In visitUris of RemoteViews.java, there is a possible way to reveal images across users due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n - - -- [Trinadh465/platform_frameworks_base_CVE-2023-21286](https://github.com/Trinadh465/platform_frameworks_base_CVE-2023-21286) - -### CVE-2023-21288 (2023-08-14) - -In visitUris of Notification.java, there is a possible way to reveal images across users due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.\n\n - - -- [Trinadh465/platform_frameworks_base_CVE-2023-21288](https://github.com/Trinadh465/platform_frameworks_base_CVE-2023-21288) - ### CVE-2023-21554 (2023-04-11) Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability @@ -9812,7 +9658,6 @@ - [3yujw7njai/CVE-2023-21768-POC](https://github.com/3yujw7njai/CVE-2023-21768-POC) - [h1bAna/CVE-2023-21768](https://github.com/h1bAna/CVE-2023-21768) - [zoemurmure/CVE-2023-21768-AFD-for-WinSock-EoP-exploit](https://github.com/zoemurmure/CVE-2023-21768-AFD-for-WinSock-EoP-exploit) -- [Rosayxy/Recreate-cve-2023-21768](https://github.com/Rosayxy/Recreate-cve-2023-21768) - [ldrx30/CVE-2023-21768](https://github.com/ldrx30/CVE-2023-21768) - [xboxoneresearch/CVE-2023-21768-dotnet](https://github.com/xboxoneresearch/CVE-2023-21768-dotnet) @@ -9911,15 +9756,8 @@ Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances. \r\n\r\nAtlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue. -- [ErikWynter/CVE-2023-22515-Scan](https://github.com/ErikWynter/CVE-2023-22515-Scan) -- [j3seer/CVE-2023-22515-POC](https://github.com/j3seer/CVE-2023-22515-POC) -- [Chocapikk/CVE-2023-22515](https://github.com/Chocapikk/CVE-2023-22515) -- [ad-calcium/CVE-2023-22515](https://github.com/ad-calcium/CVE-2023-22515) - [kh4sh3i/CVE-2023-22515](https://github.com/kh4sh3i/CVE-2023-22515) - [sincere9/CVE-2023-22515](https://github.com/sincere9/CVE-2023-22515) -- [Le1a/CVE-2023-22515](https://github.com/Le1a/CVE-2023-22515) -- [Vulnmachines/confluence-cve-2023-22515](https://github.com/Vulnmachines/confluence-cve-2023-22515) -- [iveresk/CVE-2023-22515](https://github.com/iveresk/CVE-2023-22515) - [youcannotseemeagain/CVE-2023-22515_RCE](https://github.com/youcannotseemeagain/CVE-2023-22515_RCE) - [DsaHen/cve-2023-22515-exp](https://github.com/DsaHen/cve-2023-22515-exp) - [joaoviictorti/CVE-2023-22515](https://github.com/joaoviictorti/CVE-2023-22515) @@ -10033,13 +9871,6 @@ - [laxmiyamkolu/SUDO-privilege-escalation](https://github.com/laxmiyamkolu/SUDO-privilege-escalation) - [D0rDa4aN919/CVE-2023-22809-Exploiter](https://github.com/D0rDa4aN919/CVE-2023-22809-Exploiter) -### CVE-2023-22855 (2023-02-15) - -Kardex Mlog MCC 5.7.12+0-a203c2a213-master allows remote code execution. It spawns a web interface listening on port 8088. A user-controllable path is handed to a path-concatenation method (Path.Combine from .NET) without proper sanitisation. This yields the possibility of including local files, as well as remote files on SMB shares. If one provides a file with the extension .t4, it is rendered with the .NET templating engine mono/t4, which can execute code. - - -- [vianic/CVE-2023-22855](https://github.com/vianic/CVE-2023-22855) - ### CVE-2023-22884 (2023-01-21) Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Apache Software Foundation Apache Airflow, Apache Software Foundation Apache Airflow MySQL Provider.This issue affects Apache Airflow: before 2.5.1; Apache Airflow MySQL Provider: before 4.0.0.\n\n @@ -10364,13 +10195,6 @@ - [adhikara13/CVE-2023-24489-ShareFile](https://github.com/adhikara13/CVE-2023-24489-ShareFile) - [whalebone7/CVE-2023-24489-poc](https://github.com/whalebone7/CVE-2023-24489-poc) -### CVE-2023-24517 (2023-08-22) - -Unrestricted Upload of File with Dangerous Type vulnerability in the Pandora FMS File Manager component, allows an attacker to make make use of this issue ( unrestricted file upload ) to execute arbitrary system commands. This issue affects Pandora FMS v767 version and prior versions on all platforms. - - -- [Argonx21/CVE-2023-24517](https://github.com/Argonx21/CVE-2023-24517) - ### CVE-2023-24538 (2023-04-06) Templates do not properly consider backticks (`) as Javascript string delimiters, and do not escape them as expected. Backticks are used, since ES6, for JS template literals. If a template contains a Go template action within a Javascript template literal, the contents of the action can be used to terminate the literal, injecting arbitrary Javascript code into the Go template. As ES6 template literals are rather complex, and themselves can do string interpolation, the decision was made to simply disallow Go template actions from being used inside of them (e.g. "var a = {{.}}"), since there is no obviously safe way to allow this behavior. This takes the same approach as github.com/google/safehtml. With fix, Template.Parse returns an Error when it encounters templates like this, with an ErrorCode of value 12. This ErrorCode is currently unexported, but will be exported in the release of Go 1.21. Users who rely on the previous behavior can re-enable it using the GODEBUG flag jstmpllitinterp=1, with the caveat that backticks will now be escaped. This should be used with caution. @@ -10835,7 +10659,6 @@ - [qwqdanchun/CVE-2023-27363](https://github.com/qwqdanchun/CVE-2023-27363) - [webraybtl/CVE-2023-27363](https://github.com/webraybtl/CVE-2023-27363) -- [CN016/-Foxit-PDF-CVE-2023-27363-](https://github.com/CN016/-Foxit-PDF-CVE-2023-27363-) ### CVE-2023-27372 (2023-02-28) @@ -10871,7 +10694,6 @@ - [TardC/CVE-2023-27524](https://github.com/TardC/CVE-2023-27524) - [necroteddy/CVE-2023-27524](https://github.com/necroteddy/CVE-2023-27524) - [jakabakos/CVE-2023-27524-Apache-Superset-Auth-Bypass-and-RCE](https://github.com/jakabakos/CVE-2023-27524-Apache-Superset-Auth-Bypass-and-RCE) -- [CN016/Apache-Superset-SECRET_KEY-CVE-2023-27524-](https://github.com/CN016/Apache-Superset-SECRET_KEY-CVE-2023-27524-) - [h1n4mx0/Research-CVE-2023-27524](https://github.com/h1n4mx0/Research-CVE-2023-27524) - [karthi-the-hacker/CVE-2023-27524](https://github.com/karthi-the-hacker/CVE-2023-27524) - [Cappricio-Securities/CVE-2023-27524](https://github.com/Cappricio-Securities/CVE-2023-27524) @@ -10953,8 +10775,6 @@ - [puckiestyle/cve-2023-27997](https://github.com/puckiestyle/cve-2023-27997) - [TechinsightsPro/ShodanFortiOS](https://github.com/TechinsightsPro/ShodanFortiOS) - [Cyb3rEnthusiast/CVE-2023-27997](https://github.com/Cyb3rEnthusiast/CVE-2023-27997) -- [lexfo/xortigate-cve-2023-27997](https://github.com/lexfo/xortigate-cve-2023-27997) -- [delsploit/CVE-2023-27997](https://github.com/delsploit/CVE-2023-27997) - [node011/CVE-2023-27997-POC](https://github.com/node011/CVE-2023-27997-POC) ### CVE-2023-28121 (2023-04-12) @@ -11046,20 +10866,6 @@ - [horizon3ai/CVE-2023-28324](https://github.com/horizon3ai/CVE-2023-28324) -### CVE-2023-28329 (2023-03-23) - -Insufficient validation of profile field availability condition resulted in an SQL injection risk (by default only available to teachers and managers). - - -- [cli-ish/CVE-2023-28329](https://github.com/cli-ish/CVE-2023-28329) - -### CVE-2023-28330 (2023-03-23) - -Insufficient sanitizing in backup resulted in an arbitrary file read risk. The capability to access this feature is only available to teachers, managers and admins by default. - - -- [cli-ish/CVE-2023-28330](https://github.com/cli-ish/CVE-2023-28330) - ### CVE-2023-28343 (2023-03-14) OS command injection affects Altenergy Power Control Software C1.2.5 via shell metacharacters in the index.php/management/set_timezone timezone parameter, because of set_timezone in models/management_model.php. @@ -11212,7 +11018,6 @@ - [Chocapikk/CVE-2023-29357](https://github.com/Chocapikk/CVE-2023-29357) - [LuemmelSec/CVE-2023-29357](https://github.com/LuemmelSec/CVE-2023-29357) -- [KeyStrOke95/CVE-2023-29357-ExE](https://github.com/KeyStrOke95/CVE-2023-29357-ExE) - [Guillaume-Risch/cve-2023-29357-Sharepoint](https://github.com/Guillaume-Risch/cve-2023-29357-Sharepoint) - [Jev1337/CVE-2023-29357-Check](https://github.com/Jev1337/CVE-2023-29357-Check) - [AhmedMansour93/Event-ID-189-Rule-Name-SOC227-CVE-2023-29357](https://github.com/AhmedMansour93/Event-ID-189-Rule-Name-SOC227-CVE-2023-29357) @@ -11276,7 +11081,6 @@ - [tucommenceapousser/CVE-2023-29489](https://github.com/tucommenceapousser/CVE-2023-29489) - [tucommenceapousser/CVE-2023-29489.py](https://github.com/tucommenceapousser/CVE-2023-29489.py) - [ViperM4sk/cpanel-xss-177](https://github.com/ViperM4sk/cpanel-xss-177) -- [S4muraiMelayu1337/CVE-2023-29489](https://github.com/S4muraiMelayu1337/CVE-2023-29489) - [SynixCyberCrimeMy/CVE-2023-29489](https://github.com/SynixCyberCrimeMy/CVE-2023-29489) - [Makurorororororororo/Validate-CVE-2023-29489-scanner-](https://github.com/Makurorororororororo/Validate-CVE-2023-29489-scanner-) - [prasad-1808/tool-29489](https://github.com/prasad-1808/tool-29489) @@ -11313,13 +11117,6 @@ - [xiaosed/CVE-2023-29919](https://github.com/xiaosed/CVE-2023-29919) -### CVE-2023-29922 (2023-04-19) - -PowerJob V4.3.1 is vulnerable to Incorrect Access Control via the create user/save interface. - - -- [CN016/Powerjob-CVE-2023-29922-](https://github.com/CN016/Powerjob-CVE-2023-29922-) - ### CVE-2023-29923 (2023-04-19) PowerJob V4.3.1 is vulnerable to Insecure Permissions. via the list job interface. @@ -11590,7 +11387,6 @@ - [sqrtZeroKnowledge/Elasticsearch-Exploit-CVE-2023-31419](https://github.com/sqrtZeroKnowledge/Elasticsearch-Exploit-CVE-2023-31419) -- [u238/Elasticsearch-CVE-2023-31419](https://github.com/u238/Elasticsearch-CVE-2023-31419) ### CVE-2023-31433 (2023-05-02) @@ -11903,7 +11699,6 @@ - [ThatNotEasy/CVE-2023-32315](https://github.com/ThatNotEasy/CVE-2023-32315) - [izzz0/CVE-2023-32315-POC](https://github.com/izzz0/CVE-2023-32315-POC) - [gibran-abdillah/CVE-2023-32315](https://github.com/gibran-abdillah/CVE-2023-32315) -- [CN016/Openfire-RCE-CVE-2023-32315-](https://github.com/CN016/Openfire-RCE-CVE-2023-32315-) - [K3ysTr0K3R/CVE-2023-32315-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2023-32315-EXPLOIT) - [bryanqb07/CVE-2023-32315](https://github.com/bryanqb07/CVE-2023-32315) @@ -12008,7 +11803,6 @@ - [LeDocteurDesBits/cve-2023-32784](https://github.com/LeDocteurDesBits/cve-2023-32784) - [hau-zy/KeePass-dump-py](https://github.com/hau-zy/KeePass-dump-py) - [dawnl3ss/CVE-2023-32784](https://github.com/dawnl3ss/CVE-2023-32784) -- [le01s/poc-CVE-2023-32784](https://github.com/le01s/poc-CVE-2023-32784) - [mister-turtle/cve-2023-32784](https://github.com/mister-turtle/cve-2023-32784) - [Cmadhushanka/CVE-2023-32784-Exploitation](https://github.com/Cmadhushanka/CVE-2023-32784-Exploitation) - [SarahZimmermann-Schmutzler/exploit_keepass](https://github.com/SarahZimmermann-Schmutzler/exploit_keepass) @@ -12134,13 +11928,6 @@ - [Skr11lex/CVE-2023-33477](https://github.com/Skr11lex/CVE-2023-33477) -### CVE-2023-33517 (2023-10-23) - -carRental 1.0 is vulnerable to Incorrect Access Control (Arbitrary File Read on the Back-end System). - - -- [wushigudan/CVE-2023-33517](https://github.com/wushigudan/CVE-2023-33517) - ### CVE-2023-33580 (2023-06-26) Phpgurukul Student Study Center Management System V1.0 is vulnerable to Cross Site Scripting (XSS) in the "Admin Name" field on Admin Profile page. @@ -12744,13 +12531,6 @@ - [J466Y/test_CVE-2023-36025](https://github.com/J466Y/test_CVE-2023-36025) - [coolman6942o/-EXPLOIT-CVE-2023-36025](https://github.com/coolman6942o/-EXPLOIT-CVE-2023-36025) -### CVE-2023-36076 (2023-09-01) - -SQL Injection vulnerability in smanga version 3.1.9 and earlier, allows remote attackers to execute arbitrary code and gain sensitive information via mediaId, mangaId, and userId parameters in php/history/add.php. - - -- [deIndra/CVE-2023-36076](https://github.com/deIndra/CVE-2023-36076) - ### CVE-2023-36085 (2023-10-24) The sisqualWFM 7.1.319.103 thru 7.1.319.111 for Android, has a host header injection vulnerability in its "/sisqualIdentityServer/core/" endpoint. By modifying the HTTP Host header, an attacker can change webpage links and even redirect users to arbitrary or malicious locations. This can lead to phishing attacks, malware distribution, and unauthorized access to sensitive resources. @@ -12929,7 +12709,6 @@ Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability -- [chompie1337/Windows_MSKSSRV_LPE_CVE-2023-36802](https://github.com/chompie1337/Windows_MSKSSRV_LPE_CVE-2023-36802) - [4zur-0312/CVE-2023-36802](https://github.com/4zur-0312/CVE-2023-36802) - [x0rb3l/CVE-2023-36802-MSKSSRV-LPE](https://github.com/x0rb3l/CVE-2023-36802-MSKSSRV-LPE) - [Nero22k/cve-2023-36802](https://github.com/Nero22k/cve-2023-36802) @@ -12961,8 +12740,6 @@ - [toanln-cov/CVE-2023-36845](https://github.com/toanln-cov/CVE-2023-36845) - [halencarjunior/CVE-2023-36845](https://github.com/halencarjunior/CVE-2023-36845) - [zaenhaxor/CVE-2023-36845](https://github.com/zaenhaxor/CVE-2023-36845) -- [simrotion13/CVE-2023-36845](https://github.com/simrotion13/CVE-2023-36845) -- [cyberh3als/CVE-2023-36845-POC](https://github.com/cyberh3als/CVE-2023-36845-POC) - [3yujw7njai/ansible-cve-2023-36845](https://github.com/3yujw7njai/ansible-cve-2023-36845) - [Asbawy/Automation-for-Juniper-cve-2023-36845](https://github.com/Asbawy/Automation-for-Juniper-cve-2023-36845) - [jahithoque/Juniper-CVE-2023-36845-Mass-Hunting](https://github.com/jahithoque/Juniper-CVE-2023-36845-Mass-Hunting) @@ -13287,12 +13064,6 @@ This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means "let the host resolve the name" could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.\n -- [UTsweetyfish/CVE-2023-38545](https://github.com/UTsweetyfish/CVE-2023-38545) -- [imfht/CVE-2023-38545](https://github.com/imfht/CVE-2023-38545) -- [fatmo666/CVE-2023-38545-libcurl-SOCKS5-heap-buffer-overflow](https://github.com/fatmo666/CVE-2023-38545-libcurl-SOCKS5-heap-buffer-overflow) -- [vanigori/CVE-2023-38545-sample](https://github.com/vanigori/CVE-2023-38545-sample) -- [dbrugman/CVE-2023-38545-POC](https://github.com/dbrugman/CVE-2023-38545-POC) -- [bcdannyboy/CVE-2023-38545](https://github.com/bcdannyboy/CVE-2023-38545) - [d0rb/CVE-2023-38545](https://github.com/d0rb/CVE-2023-38545) - [Yang-Shun-Yu/CVE-2023-38545](https://github.com/Yang-Shun-Yu/CVE-2023-38545) - [nphuang/NS-Project-2024-Spring](https://github.com/nphuang/NS-Project-2024-Spring) @@ -13336,16 +13107,7 @@ - [Any3ite/cve-2023-38646-metabase-ReverseShell](https://github.com/Any3ite/cve-2023-38646-metabase-ReverseShell) - [robotmikhro/CVE-2023-38646](https://github.com/robotmikhro/CVE-2023-38646) - [kh4sh3i/CVE-2023-38646](https://github.com/kh4sh3i/CVE-2023-38646) -- [yxl2001/CVE-2023-38646](https://github.com/yxl2001/CVE-2023-38646) -- [alexandre-pecorilla/CVE-2023-38646](https://github.com/alexandre-pecorilla/CVE-2023-38646) - [m3m0o/metabase-pre-auth-rce-poc](https://github.com/m3m0o/metabase-pre-auth-rce-poc) -- [CN016/Metabase-H2-CVE-2023-38646-](https://github.com/CN016/Metabase-H2-CVE-2023-38646-) -- [Boogipop/MetabaseRceTools](https://github.com/Boogipop/MetabaseRceTools) -- [nickswink/CVE-2023-38646](https://github.com/nickswink/CVE-2023-38646) -- [passwa11/CVE-2023-38646](https://github.com/passwa11/CVE-2023-38646) -- [threatHNTR/CVE-2023-38646](https://github.com/threatHNTR/CVE-2023-38646) -- [asepsaepdin/CVE-2023-38646](https://github.com/asepsaepdin/CVE-2023-38646) -- [Pyr0sec/CVE-2023-38646](https://github.com/Pyr0sec/CVE-2023-38646) - [birdm4nw/CVE-2023-38646](https://github.com/birdm4nw/CVE-2023-38646) - [AnvithLobo/CVE-2023-38646](https://github.com/AnvithLobo/CVE-2023-38646) - [Red4mber/CVE-2023-38646](https://github.com/Red4mber/CVE-2023-38646) @@ -13368,13 +13130,6 @@ - [mrmtwoj/apache-vulnerability-testing](https://github.com/mrmtwoj/apache-vulnerability-testing) -### CVE-2023-38743 (2023-09-11) - -Zoho ManageEngine ADManager Plus before Build 7200 allows admin users to execute commands on the host machine. - - -- [PetrusViet/CVE-2023-38743](https://github.com/PetrusViet/CVE-2023-38743) - ### CVE-2023-38817 (2023-10-11) An issue in Inspect Element Ltd Echo.ac v.5.2.1.0 allows a local attacker to gain privileges via a crafted command to the echo_driver.sys component. NOTE: the vendor's position is that the reported ability for user-mode applications to execute code as NT AUTHORITY\SYSTEM was "deactivated by Microsoft itself." @@ -13431,7 +13186,6 @@ - [an040702/CVE-2023-38831](https://github.com/an040702/CVE-2023-38831) - [elefantesagradodeluzinfinita/cve-2023-38831](https://github.com/elefantesagradodeluzinfinita/cve-2023-38831) - [malvika-thakur/CVE-2023-38831](https://github.com/malvika-thakur/CVE-2023-38831) -- [ruycr4ft/CVE-2023-38831](https://github.com/ruycr4ft/CVE-2023-38831) - [Nielk74/CVE-2023-38831](https://github.com/Nielk74/CVE-2023-38831) - [kehrijksen/CVE-2023-38831](https://github.com/kehrijksen/CVE-2023-38831) - [h3xecute/SideCopy-Exploits-CVE-2023-38831](https://github.com/h3xecute/SideCopy-Exploits-CVE-2023-38831) @@ -13644,13 +13398,6 @@ - [mbadanoiu/CVE-2023-40037](https://github.com/mbadanoiu/CVE-2023-40037) -### CVE-2023-40044 (2023-09-27) - -\nIn WS_FTP Server versions prior to 8.7.4 and 8.8.2, a pre-authenticated attacker could leverage a .NET deserialization vulnerability in the Ad Hoc Transfer module to execute remote commands on the underlying WS_FTP Server operating system.  \n\n - - -- [kenbuckler/WS_FTP-CVE-2023-40044](https://github.com/kenbuckler/WS_FTP-CVE-2023-40044) - ### CVE-2023-40084 (2023-12-04) In run of MDnsSdListener.cpp, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. @@ -13762,13 +13509,6 @@ - [sahar042/CVE-2023-40297](https://github.com/sahar042/CVE-2023-40297) -### CVE-2023-40361 (2023-10-20) - -SECUDOS Qiata (DOMOS OS) 4.13 has Insecure Permissions for the previewRm.sh daily cronjob. To exploit this, an attacker needs access as a low-privileged user to the underlying DOMOS system. Every user on the system has write permission for previewRm.sh, which is executed by the root user. - - -- [vianic/CVE-2023-40361](https://github.com/vianic/CVE-2023-40361) - ### CVE-2023-40362 (2024-01-12) An issue was discovered in CentralSquare Click2Gov Building Permit before October 2023. Lack of access control protections allows remote attackers to arbitrarily delete the contractors from any user's account when the user ID and contractor information is known. @@ -13783,13 +13523,6 @@ - [geniuszlyy/GenEtherExploit](https://github.com/geniuszlyy/GenEtherExploit) -### CVE-2023-40429 (2023-09-26) - -A permissions issue was addressed with improved validation. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, watchOS 10, macOS Sonoma 14. An app may be able to access sensitive user data. - - -- [biscuitehh/cve-2023-40429-ez-device-name](https://github.com/biscuitehh/cve-2023-40429-ez-device-name) - ### CVE-2023-40459 (2023-12-04) \n\n\n\n\n\n\n\n\nThe\nACEManager component of ALEOS 4.16 and earlier does not adequately perform\ninput sanitization during authentication, which could potentially result in a\nDenial of Service (DoS) condition for ACEManager without impairing other router\nfunctions. ACEManager recovers from the DoS condition by restarting within ten\nseconds of becoming unavailable.\n\n\n\n\n\n\n @@ -14031,7 +13764,6 @@ Craft CMS is a platform for creating digital experiences. This is a high-impact, low-complexity attack vector. Users running Craft installations before 4.4.15 are encouraged to update to at least that version to mitigate the issue. This issue has been fixed in Craft CMS 4.4.15. -- [zaenhaxor/CVE-2023-41892](https://github.com/zaenhaxor/CVE-2023-41892) - [0xfalafel/CraftCMS_CVE-2023-41892](https://github.com/0xfalafel/CraftCMS_CVE-2023-41892) - [diegaccio/Craft-CMS-Exploit](https://github.com/diegaccio/Craft-CMS-Exploit) - [acesoyeo/CVE-2023-41892](https://github.com/acesoyeo/CVE-2023-41892) @@ -14050,7 +13782,6 @@ - [po6ix/POC-for-CVE-2023-41993](https://github.com/po6ix/POC-for-CVE-2023-41993) -- [hrtowii/cve-2023-41993-test](https://github.com/hrtowii/cve-2023-41993-test) - [0x06060606/CVE-2023-41993](https://github.com/0x06060606/CVE-2023-41993) - [Mangaia/cve-test](https://github.com/Mangaia/cve-test) - [J3Ss0u/CVE-2023-41993](https://github.com/J3Ss0u/CVE-2023-41993) @@ -14159,7 +13890,6 @@ - [H454NSec/CVE-2023-42793](https://github.com/H454NSec/CVE-2023-42793) - [whoamins/CVE-2023-42793](https://github.com/whoamins/CVE-2023-42793) -- [Zenmovie/CVE-2023-42793](https://github.com/Zenmovie/CVE-2023-42793) - [johnossawy/CVE-2023-42793_POC](https://github.com/johnossawy/CVE-2023-42793_POC) - [StanleyJobsonAU/GhostTown](https://github.com/StanleyJobsonAU/GhostTown) - [hotplugin0x01/CVE-2023-42793](https://github.com/hotplugin0x01/CVE-2023-42793) @@ -14182,7 +13912,6 @@ - [C1ph3rX13/CVE-2023-42820](https://github.com/C1ph3rX13/CVE-2023-42820) -- [Startr4ck/cve-2023-42820](https://github.com/Startr4ck/cve-2023-42820) ### CVE-2023-42860 (2024-02-21) @@ -14212,20 +13941,6 @@ - [jostaub/ghostscript-CVE-2023-43115](https://github.com/jostaub/ghostscript-CVE-2023-43115) -### CVE-2023-43144 (2023-09-22) - -Projectworldsl Assets-management-system-in-php 1.0 is vulnerable to SQL Injection via the "id" parameter in delete.php. - - -- [Pegasus0xx/CVE-2023-43144](https://github.com/Pegasus0xx/CVE-2023-43144) - -### CVE-2023-43147 (2023-10-12) - -PHPJabbers Limo Booking Software 1.0 is vulnerable to Cross Site Request Forgery (CSRF) to add an admin user via the Add Users Function, aka an index.php?controller=pjAdminUsers&action=pjActionCreate URI. - - -- [MinoTauro2020/CVE-2023-43147](https://github.com/MinoTauro2020/CVE-2023-43147) - ### CVE-2023-43148 (2023-10-12) SPA-Cart 1.9.0.3 has a Cross Site Request Forgery (CSRF) vulnerability that allows a remote attacker to delete all accounts. @@ -14233,13 +13948,6 @@ - [MinoTauro2020/CVE-2023-43148](https://github.com/MinoTauro2020/CVE-2023-43148) -### CVE-2023-43149 (2023-10-12) - -SPA-Cart 1.9.0.3 is vulnerable to Cross Site Request Forgery (CSRF) that allows a remote attacker to add an admin user with role status. - - -- [MinoTauro2020/CVE-2023-43149](https://github.com/MinoTauro2020/CVE-2023-43149) - ### CVE-2023-43154 (2023-09-26) In Macrob7 Macs Framework Content Management System (CMS) 1.1.4f, loose comparison in "isValidLogin()" function during login attempt results in PHP type confusion vulnerability that leads to authentication bypass and takeover of the administrator account. @@ -14278,13 +13986,6 @@ - [b0marek/CVE-2023-43263](https://github.com/b0marek/CVE-2023-43263) -### CVE-2023-43284 (2023-10-05) - -D-Link Wireless MU-MIMO Gigabit AC1200 Router DIR-846 100A53DBR-Retail devices allow an authenticated remote attacker to execute arbitrary code via an unspecified manipulation of the QoS POST parameter. - - -- [MateusTesser/CVE-2023-43284](https://github.com/MateusTesser/CVE-2023-43284) - ### CVE-2023-43317 (2024-01-24) An issue in Coign CRM Portal v.06.06 allows a remote attacker to escalate privileges via the userPermissionsList parameter in Session Storage component. @@ -14520,13 +14221,6 @@ - [jfrog/jfrog-CVE-2023-43786-libX11_DoS](https://github.com/jfrog/jfrog-CVE-2023-43786-libX11_DoS) -### CVE-2023-43838 (2023-10-04) - -An arbitrary file upload vulnerability in Personal Management System v1.4.64 allows attackers to execute arbitrary code via uploading a crafted SVG file into a user profile's avatar. - - -- [rootd4ddy/CVE-2023-43838](https://github.com/rootd4ddy/CVE-2023-43838) - ### CVE-2023-43871 (2023-09-28) A File upload vulnerability in WBCE v.1.6.1 allows a local attacker to upload a pdf file with hidden Cross Site Scripting (XSS). @@ -14624,11 +14318,7 @@ - [bcdannyboy/CVE-2023-44487](https://github.com/bcdannyboy/CVE-2023-44487) -- [imabee101/CVE-2023-44487](https://github.com/imabee101/CVE-2023-44487) -- [ByteHackr/CVE-2023-44487](https://github.com/ByteHackr/CVE-2023-44487) -- [pabloec20/rapidreset](https://github.com/pabloec20/rapidreset) - [secengjeff/rapidresetclient](https://github.com/secengjeff/rapidresetclient) -- [studiogangster/CVE-2023-44487](https://github.com/studiogangster/CVE-2023-44487) - [ReToCode/golang-CVE-2023-44487](https://github.com/ReToCode/golang-CVE-2023-44487) - [ndrscodes/http2-rst-stream-attacker](https://github.com/ndrscodes/http2-rst-stream-attacker) - [nxenon/cve-2023-44487](https://github.com/nxenon/cve-2023-44487) @@ -14743,20 +14433,6 @@ - [ahrixia/CVE-2023-44813](https://github.com/ahrixia/CVE-2023-44813) -### CVE-2023-44961 (2023-10-11) - -SQL Injection vulnerability in Koha Library Software 23.0.5.04 and before allows a remote attacker to obtain sensitive information via the intranet/cgi bin/cataloging/ysearch.pl. component. - - -- [ggb0n/CVE-2023-44961](https://github.com/ggb0n/CVE-2023-44961) - -### CVE-2023-44962 (2023-10-11) - -File Upload vulnerability in Koha Library Software 23.05.04 and before allows a remote attacker to read arbitrary files via the upload-cover-image.pl component. - - -- [ggb0n/CVE-2023-44962](https://github.com/ggb0n/CVE-2023-44962) - ### CVE-2023-44976 - [keowu/BadRentdrv2](https://github.com/keowu/BadRentdrv2) @@ -14811,13 +14487,6 @@ - [hex0punk/cont-flood-poc](https://github.com/hex0punk/cont-flood-poc) -### CVE-2023-45471 (2023-10-20) - -The QAD Search Server is vulnerable to Stored Cross-Site Scripting (XSS) in versions up to, and including, 1.0.0.315 due to insufficient checks on indexes. This makes it possible for unauthenticated attackers to create a new index and inject a malicious web script into its name, that will execute whenever a user accesses the search page. - - -- [mehdibelhajamor/CVE-2023-45471](https://github.com/mehdibelhajamor/CVE-2023-45471) - ### CVE-2023-45503 (2024-04-15) SQL Injection vulnerability in Macrob7 Macs CMS 1.1.4f, allows remote attackers to execute arbitrary code, cause a denial of service (DoS), escalate privileges, and obtain sensitive information via crafted payload to resetPassword, forgotPasswordProcess, saveUser, saveRole, deleteUser, deleteRole, deleteComment, deleteUser, allowComment, saveRole, forgotPasswordProcess, resetPassword, saveUser, addComment, saveRole, and saveUser endpoints. @@ -14874,15 +14543,11 @@ - [200101WhoAmI/CVE-2023-45827](https://github.com/200101WhoAmI/CVE-2023-45827) -### CVE-2023-45828 -- [RandomRobbieBF/CVE-2023-45828](https://github.com/RandomRobbieBF/CVE-2023-45828) - ### CVE-2023-45857 (2023-11-08) An issue discovered in Axios 1.5.1 inadvertently reveals the confidential XSRF-TOKEN stored in cookies by including it in the HTTP header X-XSRF-TOKEN for every request made to any host allowing attackers to view sensitive information. -- [valentin-panov/CVE-2023-45857](https://github.com/valentin-panov/CVE-2023-45857) - [intercept6/CVE-2023-45857-Demo](https://github.com/intercept6/CVE-2023-45857-Demo) - [fuyuooumi1027/CVE-2023-45857-Demo](https://github.com/fuyuooumi1027/CVE-2023-45857-Demo) @@ -14900,27 +14565,6 @@ - [Danyw24/blueXploit](https://github.com/Danyw24/blueXploit) - [xG3nesis/RustyInjector](https://github.com/xG3nesis/RustyInjector) -### CVE-2023-45966 (2023-10-23) - -umputun remark42 version 1.12.1 and before has a Blind Server-Side Request Forgery (SSRF) vulnerability. - - -- [jet-pentest/CVE-2023-45966](https://github.com/jet-pentest/CVE-2023-45966) - -### CVE-2023-45992 (2023-10-19) - -A vulnerability in the web-based interface of the RUCKUS Cloudpath product on version 5.12 build 5538 or before to could allow a remote, unauthenticated attacker to execute persistent XSS and CSRF attacks against a user of the admin management interface. A successful attack, combined with a certain admin activity, could allow the attacker to gain full admin privileges on the exploited system. - - -- [harry935/CVE-2023-45992](https://github.com/harry935/CVE-2023-45992) - -### CVE-2023-46003 (2023-10-21) - -I-doit pro 25 and below is vulnerable to Cross Site Scripting (XSS) via index.php. - - -- [leekenghwa/CVE-2023-46003](https://github.com/leekenghwa/CVE-2023-46003) - ### CVE-2023-46012 (2024-05-07) Buffer Overflow vulnerability LINKSYS EA7500 3.0.1.207964 allows a remote attacker to execute arbitrary code via an HTTP request to the IGD UPnP. @@ -15988,13 +15632,6 @@ - [Meirelez/SSR-DNSSEC](https://github.com/Meirelez/SSR-DNSSEC) - [Pablodiz/CVE-2023-50387](https://github.com/Pablodiz/CVE-2023-50387) -### CVE-2023-50465 (2023-12-11) - -A stored cross-site scripting (XSS) vulnerability exists in Monica (aka MonicaHQ) 4.0.0 via an SVG document uploaded by an authenticated user. - - -- [Ev3rR3d/CVE-2023-50465](https://github.com/Ev3rR3d/CVE-2023-50465) - ### CVE-2023-50564 (2023-12-14) An arbitrary file upload vulnerability in the component /inc/modules_install.php of Pluck-CMS v4.7.18 allows attackers to execute arbitrary code via uploading a crafted ZIP file.