diff --git a/2017/CVE-2017-7494.json b/2017/CVE-2017-7494.json index d9bb21a52f..84af69d100 100644 --- a/2017/CVE-2017-7494.json +++ b/2017/CVE-2017-7494.json @@ -78,7 +78,7 @@ "stargazers_count": 365, "watchers_count": 365, "has_discussions": false, - "forks_count": 110, + "forks_count": 111, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -90,7 +90,7 @@ "sambacry" ], "visibility": "public", - "forks": 110, + "forks": 111, "watchers": 365, "score": 0, "subscribers_count": 10 diff --git a/2019/CVE-2019-5420.json b/2019/CVE-2019-5420.json index 4dd835d496..5259e7c8a8 100644 --- a/2019/CVE-2019-5420.json +++ b/2019/CVE-2019-5420.json @@ -163,10 +163,10 @@ "description": "A vulnerability can allow an attacker to guess the automatically generated development mode secret token.", "fork": false, "created_at": "2021-09-06T12:28:05Z", - "updated_at": "2023-04-11T06:06:59Z", + "updated_at": "2024-01-14T22:39:28Z", "pushed_at": "2021-09-07T13:11:02Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -175,7 +175,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 2 }, diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 67679d87b8..b4abef2ff1 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -2523,6 +2523,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2021/CVE-2021-3560.json b/2021/CVE-2021-3560.json index 834fa70ab0..98b5afa9d4 100644 --- a/2021/CVE-2021-3560.json +++ b/2021/CVE-2021-3560.json @@ -142,10 +142,10 @@ "description": null, "fork": false, "created_at": "2021-06-14T20:08:20Z", - "updated_at": "2023-12-18T07:20:39Z", + "updated_at": "2024-01-14T18:47:16Z", "pushed_at": "2022-11-16T13:14:56Z", - "stargazers_count": 105, - "watchers_count": 105, + "stargazers_count": 106, + "watchers_count": 106, "has_discussions": false, "forks_count": 52, "allow_forking": true, @@ -154,7 +154,7 @@ "topics": [], "visibility": "public", "forks": 52, - "watchers": 105, + "watchers": 106, "score": 0, "subscribers_count": 2 }, diff --git a/2021/CVE-2021-4154.json b/2021/CVE-2021-4154.json index f9c72f4d17..c7a89520f3 100644 --- a/2021/CVE-2021-4154.json +++ b/2021/CVE-2021-4154.json @@ -18,13 +18,13 @@ "stargazers_count": 65, "watchers_count": 65, "has_discussions": false, - "forks_count": 17, + "forks_count": 18, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 17, + "forks": 18, "watchers": 65, "score": 0, "subscribers_count": 5 diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 0fe6ff8fe2..3344ac77ac 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -5156,6 +5156,44 @@ "score": 0, "subscribers_count": 8 }, + { + "id": 438034703, + "name": "log4shell-tools", + "full_name": "alexbakker\/log4shell-tools", + "owner": { + "login": "alexbakker", + "id": 2387841, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2387841?v=4", + "html_url": "https:\/\/github.com\/alexbakker" + }, + "html_url": "https:\/\/github.com\/alexbakker\/log4shell-tools", + "description": "Tool that runs a test to check whether one of your applications is affected by the recent vulnerabilities in log4j: CVE-2021-44228 and CVE-2021-45046", + "fork": false, + "created_at": "2021-12-13T21:47:41Z", + "updated_at": "2024-01-14T21:20:04Z", + "pushed_at": "2023-12-20T13:58:44Z", + "stargazers_count": 81, + "watchers_count": 81, + "has_discussions": false, + "forks_count": 14, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "cve-2021-44228", + "cve-2021-45046", + "dns", + "jndi", + "ldap", + "log4j", + "log4shell" + ], + "visibility": "public", + "forks": 14, + "watchers": 81, + "score": 0, + "subscribers_count": 4 + }, { "id": 438043313, "name": "find-log4j", @@ -12401,7 +12439,7 @@ "fork": false, "created_at": "2023-12-27T08:49:38Z", "updated_at": "2023-12-27T22:59:37Z", - "pushed_at": "2023-12-28T23:44:19Z", + "pushed_at": "2024-01-14T23:40:01Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-0219.json b/2022/CVE-2022-0219.json new file mode 100644 index 0000000000..1e64d49a02 --- /dev/null +++ b/2022/CVE-2022-0219.json @@ -0,0 +1,32 @@ +[ + { + "id": 450128440, + "name": "CVE-2022-0219", + "full_name": "Haxatron\/CVE-2022-0219", + "owner": { + "login": "Haxatron", + "id": 76475453, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76475453?v=4", + "html_url": "https:\/\/github.com\/Haxatron" + }, + "html_url": "https:\/\/github.com\/Haxatron\/CVE-2022-0219", + "description": null, + "fork": false, + "created_at": "2022-01-20T14:24:45Z", + "updated_at": "2022-01-20T14:24:45Z", + "pushed_at": "2022-01-20T14:35:00Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-0236.json b/2022/CVE-2022-0236.json new file mode 100644 index 0000000000..1815a5c0dc --- /dev/null +++ b/2022/CVE-2022-0236.json @@ -0,0 +1,64 @@ +[ + { + "id": 448514056, + "name": "CVE-2022-0236", + "full_name": "qurbat\/CVE-2022-0236", + "owner": { + "login": "qurbat", + "id": 37518297, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37518297?v=4", + "html_url": "https:\/\/github.com\/qurbat" + }, + "html_url": "https:\/\/github.com\/qurbat\/CVE-2022-0236", + "description": "Proof of concept for unauthenticated sensitive data disclosure affecting the wp-import-export WordPress plugin (CVE-2022-0236)", + "fork": false, + "created_at": "2022-01-16T09:52:28Z", + "updated_at": "2023-01-28T03:56:57Z", + "pushed_at": "2022-01-18T17:14:53Z", + "stargazers_count": 3, + "watchers_count": 3, + "has_discussions": false, + "forks_count": 2, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "wordpress-security" + ], + "visibility": "public", + "forks": 2, + "watchers": 3, + "score": 0, + "subscribers_count": 1 + }, + { + "id": 448893968, + "name": "CVE-2022-0236", + "full_name": "xiska62314\/CVE-2022-0236", + "owner": { + "login": "xiska62314", + "id": 97891523, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97891523?v=4", + "html_url": "https:\/\/github.com\/xiska62314" + }, + "html_url": "https:\/\/github.com\/xiska62314\/CVE-2022-0236", + "description": "CVE-2022-0236", + "fork": false, + "created_at": "2022-01-17T12:56:19Z", + "updated_at": "2022-01-17T12:56:19Z", + "pushed_at": "2022-01-17T12:56:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-21658.json b/2022/CVE-2022-21658.json new file mode 100644 index 0000000000..41ecb52efd --- /dev/null +++ b/2022/CVE-2022-21658.json @@ -0,0 +1,36 @@ +[ + { + "id": 450374545, + "name": "cve-2022-21658", + "full_name": "sagittarius-a\/cve-2022-21658", + "owner": { + "login": "sagittarius-a", + "id": 8809698, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8809698?v=4", + "html_url": "https:\/\/github.com\/sagittarius-a" + }, + "html_url": "https:\/\/github.com\/sagittarius-a\/cve-2022-21658", + "description": "POC for cve-2022-21658", + "fork": false, + "created_at": "2022-01-21T06:09:16Z", + "updated_at": "2023-10-03T02:34:46Z", + "pushed_at": "2022-01-21T06:09:29Z", + "stargazers_count": 2, + "watchers_count": 2, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "cve-2022-21658", + "poc", + "rust" + ], + "visibility": "public", + "forks": 1, + "watchers": 2, + "score": 0, + "subscribers_count": 2 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-21660.json b/2022/CVE-2022-21660.json index 69d302d40d..653ef529ba 100644 --- a/2022/CVE-2022-21660.json +++ b/2022/CVE-2022-21660.json @@ -1,4 +1,34 @@ [ + { + "id": 446296593, + "name": "Gin-Vue-admin-poc-CVE-2022-21660", + "full_name": "UzJu\/Gin-Vue-admin-poc-CVE-2022-21660", + "owner": { + "login": "UzJu", + "id": 50813806, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50813806?v=4", + "html_url": "https:\/\/github.com\/UzJu" + }, + "html_url": "https:\/\/github.com\/UzJu\/Gin-Vue-admin-poc-CVE-2022-21660", + "description": "CVE-2022-21660", + "fork": false, + "created_at": "2022-01-10T05:50:35Z", + "updated_at": "2023-08-04T05:22:54Z", + "pushed_at": "2022-01-10T05:52:03Z", + "stargazers_count": 25, + "watchers_count": 25, + "has_discussions": false, + "forks_count": 2, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 2, + "watchers": 25, + "score": 0, + "subscribers_count": 1 + }, { "id": 462232980, "name": "CVE-2022-21660", diff --git a/2022/CVE-2022-21907.json b/2022/CVE-2022-21907.json index bcc1766ae9..14b3fd76cc 100644 --- a/2022/CVE-2022-21907.json +++ b/2022/CVE-2022-21907.json @@ -79,6 +79,66 @@ "score": 0, "subscribers_count": 3 }, + { + "id": 448729790, + "name": "CVE-2022-21907", + "full_name": "ZZ-SOCMAP\/CVE-2022-21907", + "owner": { + "login": "ZZ-SOCMAP", + "id": 98105412, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98105412?v=4", + "html_url": "https:\/\/github.com\/ZZ-SOCMAP" + }, + "html_url": "https:\/\/github.com\/ZZ-SOCMAP\/CVE-2022-21907", + "description": "HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907", + "fork": false, + "created_at": "2022-01-17T02:28:50Z", + "updated_at": "2024-01-12T14:50:41Z", + "pushed_at": "2022-01-20T02:07:59Z", + "stargazers_count": 361, + "watchers_count": 361, + "has_discussions": false, + "forks_count": 98, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 98, + "watchers": 361, + "score": 0, + "subscribers_count": 10 + }, + { + "id": 448909871, + "name": "CVE-2022-21907", + "full_name": "xiska62314\/CVE-2022-21907", + "owner": { + "login": "xiska62314", + "id": 97891523, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97891523?v=4", + "html_url": "https:\/\/github.com\/xiska62314" + }, + "html_url": "https:\/\/github.com\/xiska62314\/CVE-2022-21907", + "description": "CVE-2022-21907", + "fork": false, + "created_at": "2022-01-17T13:42:44Z", + "updated_at": "2022-01-17T13:42:44Z", + "pushed_at": "2022-01-17T13:42:45Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + }, { "id": 448952968, "name": "CVE-2022-21907-http.sys", @@ -116,6 +176,36 @@ "score": 0, "subscribers_count": 6 }, + { + "id": 451128086, + "name": "CVE-2022-21907-Vulnerability-PoC", + "full_name": "michelep\/CVE-2022-21907-Vulnerability-PoC", + "owner": { + "login": "michelep", + "id": 1425559, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1425559?v=4", + "html_url": "https:\/\/github.com\/michelep" + }, + "html_url": "https:\/\/github.com\/michelep\/CVE-2022-21907-Vulnerability-PoC", + "description": "CVE-2022-21907 Vulnerability PoC", + "fork": false, + "created_at": "2022-01-23T14:25:12Z", + "updated_at": "2024-01-14T06:46:41Z", + "pushed_at": "2022-01-23T14:28:54Z", + "stargazers_count": 21, + "watchers_count": 21, + "has_discussions": false, + "forks_count": 11, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 11, + "watchers": 21, + "score": 0, + "subscribers_count": 2 + }, { "id": 477659433, "name": "CVE-2022-21907", diff --git a/2022/CVE-2022-22296.json b/2022/CVE-2022-22296.json new file mode 100644 index 0000000000..b67748456d --- /dev/null +++ b/2022/CVE-2022-22296.json @@ -0,0 +1,32 @@ +[ + { + "id": 450430110, + "name": "CVE-2022-22296", + "full_name": "vlakhani28\/CVE-2022-22296", + "owner": { + "login": "vlakhani28", + "id": 42069316, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42069316?v=4", + "html_url": "https:\/\/github.com\/vlakhani28" + }, + "html_url": "https:\/\/github.com\/vlakhani28\/CVE-2022-22296", + "description": "All Details about CVE-2022-22296", + "fork": false, + "created_at": "2022-01-21T09:29:21Z", + "updated_at": "2023-09-28T11:35:14Z", + "pushed_at": "2022-01-21T09:45:29Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 3, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 3, + "watchers": 1, + "score": 0, + "subscribers_count": 2 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-22965.json b/2022/CVE-2022-22965.json index d09f75d707..08c17808ec 100644 --- a/2022/CVE-2022-22965.json +++ b/2022/CVE-2022-22965.json @@ -13,12 +13,12 @@ "description": "Spring4Shell Proof Of Concept\/And vulnerable application CVE-2022-22965", "fork": false, "created_at": "2022-03-30T07:54:45Z", - "updated_at": "2024-01-13T16:00:28Z", + "updated_at": "2024-01-14T20:09:52Z", "pushed_at": "2022-11-09T15:46:06Z", - "stargazers_count": 340, - "watchers_count": 340, + "stargazers_count": 341, + "watchers_count": 341, "has_discussions": false, - "forks_count": 107, + "forks_count": 108, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -33,8 +33,8 @@ "tomcat" ], "visibility": "public", - "forks": 107, - "watchers": 340, + "forks": 108, + "watchers": 341, "score": 0, "subscribers_count": 18 }, diff --git a/2022/CVE-2022-23305.json b/2022/CVE-2022-23305.json index 92ed1c4ce1..e0462d8868 100644 --- a/2022/CVE-2022-23305.json +++ b/2022/CVE-2022-23305.json @@ -48,6 +48,38 @@ "score": 0, "subscribers_count": 5 }, + { + "id": 450360735, + "name": "CVE-2022-RCE", + "full_name": "AlphabugX\/CVE-2022-RCE", + "owner": { + "login": "AlphabugX", + "id": 27001865, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27001865?v=4", + "html_url": "https:\/\/github.com\/AlphabugX" + }, + "html_url": "https:\/\/github.com\/AlphabugX\/CVE-2022-RCE", + "description": "test 反向辣鸡数据投放 CVE-2022-23305 工具 利用 教程 Exploit POC ", + "fork": false, + "created_at": "2022-01-21T05:07:59Z", + "updated_at": "2022-11-05T22:58:02Z", + "pushed_at": "2022-01-21T05:21:25Z", + "stargazers_count": 5, + "watchers_count": 5, + "has_discussions": false, + "forks_count": 2, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "cve-2020-" + ], + "visibility": "public", + "forks": 2, + "watchers": 5, + "score": 0, + "subscribers_count": 1 + }, { "id": 670307374, "name": "CVE-2022-23305_POC", diff --git a/2022/CVE-2022-46463.json b/2022/CVE-2022-46463.json index 988c2ea2ce..5ec981cceb 100644 --- a/2022/CVE-2022-46463.json +++ b/2022/CVE-2022-46463.json @@ -13,10 +13,10 @@ "description": "CVE-2022-46463(Harbor 未授权)", "fork": false, "created_at": "2023-01-17T14:58:14Z", - "updated_at": "2024-01-12T02:52:45Z", + "updated_at": "2024-01-15T00:12:58Z", "pushed_at": "2023-01-19T12:47:21Z", - "stargazers_count": 21, - "watchers_count": 21, + "stargazers_count": 20, + "watchers_count": 20, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 8, - "watchers": 21, + "watchers": 20, "score": 0, "subscribers_count": 1 }, diff --git a/2022/CVE-2022-46689.json b/2022/CVE-2022-46689.json index 23084a3398..83f06c15af 100644 --- a/2022/CVE-2022-46689.json +++ b/2022/CVE-2022-46689.json @@ -133,10 +133,10 @@ "description": "CVE-2022-46689", "fork": false, "created_at": "2023-01-03T21:46:37Z", - "updated_at": "2024-01-07T19:37:07Z", + "updated_at": "2024-01-14T23:39:29Z", "pushed_at": "2023-01-19T08:04:02Z", - "stargazers_count": 64, - "watchers_count": 64, + "stargazers_count": 65, + "watchers_count": 65, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -145,7 +145,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 64, + "watchers": 65, "score": 0, "subscribers_count": 3 }, diff --git a/2023/CVE-2023-38831.json b/2023/CVE-2023-38831.json index 223931b3de..8336106a75 100644 --- a/2023/CVE-2023-38831.json +++ b/2023/CVE-2023-38831.json @@ -43,10 +43,10 @@ "description": "CVE-2023-38831 winrar exploit generator", "fork": false, "created_at": "2023-08-25T09:44:08Z", - "updated_at": "2024-01-14T16:43:39Z", + "updated_at": "2024-01-14T18:48:48Z", "pushed_at": "2023-11-26T06:46:44Z", - "stargazers_count": 733, - "watchers_count": 733, + "stargazers_count": 734, + "watchers_count": 734, "has_discussions": false, "forks_count": 132, "allow_forking": true, @@ -59,7 +59,7 @@ ], "visibility": "public", "forks": 132, - "watchers": 733, + "watchers": 734, "score": 0, "subscribers_count": 9 }, diff --git a/2023/CVE-2023-46604.json b/2023/CVE-2023-46604.json index 26c096c4b4..00ce7529c2 100644 --- a/2023/CVE-2023-46604.json +++ b/2023/CVE-2023-46604.json @@ -43,7 +43,7 @@ "description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具", "fork": false, "created_at": "2023-10-27T05:57:21Z", - "updated_at": "2024-01-14T16:56:25Z", + "updated_at": "2024-01-14T22:08:14Z", "pushed_at": "2024-01-04T16:03:13Z", "stargazers_count": 184, "watchers_count": 184, diff --git a/2023/CVE-2023-46805.json b/2023/CVE-2023-46805.json index 901222aed2..dfabab7fa5 100644 --- a/2023/CVE-2023-46805.json +++ b/2023/CVE-2023-46805.json @@ -13,10 +13,10 @@ "description": "Quick scanner for possible vulnerable Ivanti Connect Secure appliances by country using Shodan.", "fork": false, "created_at": "2024-01-14T18:30:11Z", - "updated_at": "2024-01-14T18:31:55Z", - "pushed_at": "2024-01-14T18:31:31Z", - "stargazers_count": 1, - "watchers_count": 1, + "updated_at": "2024-01-15T00:09:07Z", + "pushed_at": "2024-01-14T23:43:10Z", + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 3, "score": 0, "subscribers_count": 0 } diff --git a/2023/CVE-2023-50071.json b/2023/CVE-2023-50071.json index 66ad5c97d8..b2e74051dd 100644 --- a/2023/CVE-2023-50071.json +++ b/2023/CVE-2023-50071.json @@ -13,7 +13,7 @@ "description": "Multiple SQL injection vulnerabilities in \/customer_support\/ajax.php?action=save_department in Customer Support System 1.0 allow authenticated attackers to execute arbitrary SQL commands via id or name.", "fork": false, "created_at": "2023-12-16T23:06:25Z", - "updated_at": "2023-12-31T06:03:21Z", + "updated_at": "2024-01-14T20:29:08Z", "pushed_at": "2023-12-29T23:03:49Z", "stargazers_count": 1, "watchers_count": 1, diff --git a/2023/CVE-2023-51467.json b/2023/CVE-2023-51467.json index 1d3c4de808..a16163aa0c 100644 --- a/2023/CVE-2023-51467.json +++ b/2023/CVE-2023-51467.json @@ -124,10 +124,10 @@ "description": "This repo is a PoC with to exploit CVE-2023-51467 and CVE-2023-49070 preauth RCE vulnerabilities found in Apache OFBiz.", "fork": false, "created_at": "2024-01-02T14:20:10Z", - "updated_at": "2024-01-14T17:36:23Z", + "updated_at": "2024-01-14T22:22:41Z", "pushed_at": "2024-01-02T15:43:26Z", - "stargazers_count": 29, - "watchers_count": 29, + "stargazers_count": 30, + "watchers_count": 30, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -136,7 +136,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 29, + "watchers": 30, "score": 0, "subscribers_count": 1 }, @@ -184,10 +184,10 @@ "description": "Apache Ofbiz CVE-2023-51467 图形化漏洞利用工具", "fork": false, "created_at": "2024-01-06T04:07:07Z", - "updated_at": "2024-01-12T04:30:43Z", + "updated_at": "2024-01-15T00:19:00Z", "pushed_at": "2024-01-06T10:33:34Z", - "stargazers_count": 27, - "watchers_count": 27, + "stargazers_count": 28, + "watchers_count": 28, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -196,7 +196,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 27, + "watchers": 28, "score": 0, "subscribers_count": 1 }, @@ -214,10 +214,10 @@ "description": "A go-exploit for Apache OFBiz CVE-2023-51467", "fork": false, "created_at": "2024-01-09T16:58:06Z", - "updated_at": "2024-01-12T09:15:09Z", + "updated_at": "2024-01-14T21:15:22Z", "pushed_at": "2024-01-10T21:40:04Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -230,7 +230,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-6553.json b/2023/CVE-2023-6553.json index 93001359f9..14d7315975 100644 --- a/2023/CVE-2023-6553.json +++ b/2023/CVE-2023-6553.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2023-12-13T20:26:59Z", "updated_at": "2024-01-11T12:54:06Z", - "pushed_at": "2023-12-15T18:13:06Z", + "pushed_at": "2024-01-14T22:04:28Z", "stargazers_count": 49, "watchers_count": 49, "has_discussions": false, diff --git a/2023/CVE-2023-6875.json b/2023/CVE-2023-6875.json index cc6fc4651f..8d01ed20e9 100644 --- a/2023/CVE-2023-6875.json +++ b/2023/CVE-2023-6875.json @@ -13,19 +13,19 @@ "description": "CVE-2023-6875 PoC", "fork": false, "created_at": "2024-01-13T15:23:17Z", - "updated_at": "2024-01-14T17:55:39Z", + "updated_at": "2024-01-14T23:00:06Z", "pushed_at": "2024-01-13T15:26:56Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 10, + "watchers_count": 10, "has_discussions": false, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, - "watchers": 8, + "forks": 2, + "watchers": 10, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-7028.json b/2023/CVE-2023-7028.json index fc31749fd0..0b43bd75c6 100644 --- a/2023/CVE-2023-7028.json +++ b/2023/CVE-2023-7028.json @@ -43,10 +43,10 @@ "description": "CVE-2023-7028", "fork": false, "created_at": "2024-01-12T10:53:50Z", - "updated_at": "2024-01-14T16:18:07Z", + "updated_at": "2024-01-14T23:00:54Z", "pushed_at": "2024-01-12T13:56:38Z", - "stargazers_count": 24, - "watchers_count": 24, + "stargazers_count": 25, + "watchers_count": 25, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -58,7 +58,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 24, + "watchers": 25, "score": 0, "subscribers_count": 1 }, @@ -106,10 +106,10 @@ "description": "This repository presents a proof-of-concept of CVE-2023-7028", "fork": false, "created_at": "2024-01-12T18:29:27Z", - "updated_at": "2024-01-14T17:38:51Z", + "updated_at": "2024-01-14T22:57:01Z", "pushed_at": "2024-01-13T13:50:20Z", - "stargazers_count": 113, - "watchers_count": 113, + "stargazers_count": 116, + "watchers_count": 116, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -118,7 +118,7 @@ "topics": [], "visibility": "public", "forks": 15, - "watchers": 113, + "watchers": 116, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-20656.json b/2024/CVE-2024-20656.json index 8121a2734e..40ed6276dd 100644 --- a/2024/CVE-2024-20656.json +++ b/2024/CVE-2024-20656.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2024-01-12T15:08:01Z", - "updated_at": "2024-01-14T14:57:51Z", + "updated_at": "2024-01-14T20:55:57Z", "pushed_at": "2024-01-14T07:14:33Z", - "stargazers_count": 52, - "watchers_count": 52, + "stargazers_count": 53, + "watchers_count": 53, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 8, - "watchers": 52, + "watchers": 53, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-21887.json b/2024/CVE-2024-21887.json index cd51ab64ee..0d25361066 100644 --- a/2024/CVE-2024-21887.json +++ b/2024/CVE-2024-21887.json @@ -13,10 +13,10 @@ "description": "POC Checker for ivanti CVE-2024-21887 Command injcetion", "fork": false, "created_at": "2024-01-14T09:25:56Z", - "updated_at": "2024-01-14T09:27:39Z", + "updated_at": "2024-01-14T19:05:36Z", "pushed_at": "2024-01-14T09:27:36Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 0 }, @@ -43,10 +43,10 @@ "description": "Quick scanner for possible vulnerable Ivanti Connect Secure appliances by country using Shodan.", "fork": false, "created_at": "2024-01-14T18:30:11Z", - "updated_at": "2024-01-14T18:31:55Z", - "pushed_at": "2024-01-14T18:31:31Z", - "stargazers_count": 1, - "watchers_count": 1, + "updated_at": "2024-01-15T00:09:07Z", + "pushed_at": "2024-01-14T23:43:10Z", + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 3, "score": 0, "subscribers_count": 0 } diff --git a/README.md b/README.md index 66f862f265..60d82fbb9a 100644 --- a/README.md +++ b/README.md @@ -6341,6 +6341,21 @@ - [veritas501/CVE-2022-0185-PipeVersion](https://github.com/veritas501/CVE-2022-0185-PipeVersion) - [featherL/CVE-2022-0185-exploit](https://github.com/featherL/CVE-2022-0185-exploit) +### CVE-2022-0219 (2022-01-20) + +<code>Improper Restriction of XML External Entity Reference in GitHub repository skylot/jadx prior to 1.3.2. +</code> + +- [Haxatron/CVE-2022-0219](https://github.com/Haxatron/CVE-2022-0219) + +### CVE-2022-0236 (2022-01-18) + +<code>The WP Import Export WordPress plugin (both free and premium versions) is vulnerable to unauthenticated sensitive data disclosure due to a missing capability check on the download function wpie_process_file_download found in the ~/includes/classes/class-wpie-general.php file. This made it possible for unauthenticated attackers to download any imported or exported information from a vulnerable site which can contain sensitive information like user data. This affects versions up to, and including, 3.9.15. +</code> + +- [qurbat/CVE-2022-0236](https://github.com/qurbat/CVE-2022-0236) +- [xiska62314/CVE-2022-0236](https://github.com/xiska62314/CVE-2022-0236) + ### CVE-2022-0265 (2022-03-03) <code>Improper Restriction of XML External Entity Reference in GitHub repository hazelcast/hazelcast in 5.1-BETA-1. @@ -7625,11 +7640,19 @@ - [rockmelodies/Oracle-E-BS-CVE-2022-21587-Exploit](https://github.com/rockmelodies/Oracle-E-BS-CVE-2022-21587-Exploit) - [sahabrifki/CVE-2022-21587-Oracle-EBS-](https://github.com/sahabrifki/CVE-2022-21587-Oracle-EBS-) +### CVE-2022-21658 (2022-01-20) + +<code>Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn't otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don't have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions. +</code> + +- [sagittarius-a/cve-2022-21658](https://github.com/sagittarius-a/cve-2022-21658) + ### CVE-2022-21660 (2022-02-09) <code>Gin-vue-admin is a backstage management system based on vue and gin. In versions prior to 2.4.7 low privilege users are able to modify higher privilege users. Authentication is missing on the `setUserInfo` function. Users are advised to update as soon as possible. There are no known workarounds. </code> +- [UzJu/Gin-Vue-admin-poc-CVE-2022-21660](https://github.com/UzJu/Gin-Vue-admin-poc-CVE-2022-21660) - [UzJu/CVE-2022-21660](https://github.com/UzJu/CVE-2022-21660) ### CVE-2022-21661 (2022-01-06) @@ -7721,7 +7744,10 @@ - [corelight/cve-2022-21907](https://github.com/corelight/cve-2022-21907) - [mauricelambert/CVE-2022-21907](https://github.com/mauricelambert/CVE-2022-21907) +- [ZZ-SOCMAP/CVE-2022-21907](https://github.com/ZZ-SOCMAP/CVE-2022-21907) +- [xiska62314/CVE-2022-21907](https://github.com/xiska62314/CVE-2022-21907) - [p0dalirius/CVE-2022-21907-http.sys](https://github.com/p0dalirius/CVE-2022-21907-http.sys) +- [michelep/CVE-2022-21907-Vulnerability-PoC](https://github.com/michelep/CVE-2022-21907-Vulnerability-PoC) - [polakow/CVE-2022-21907](https://github.com/polakow/CVE-2022-21907) - [gpiechnik2/nmap-CVE-2022-21907](https://github.com/gpiechnik2/nmap-CVE-2022-21907) - [iveresk/cve-2022-21907-http.sys](https://github.com/iveresk/cve-2022-21907-http.sys) @@ -7799,6 +7825,13 @@ - [4lucardSec/Sonic_CVE-2022-22274_poc](https://github.com/4lucardSec/Sonic_CVE-2022-22274_poc) - [forthisvideo/CVE-2022-22274_poc](https://github.com/forthisvideo/CVE-2022-22274_poc) +### CVE-2022-22296 (2022-01-24) + +<code>Sourcecodester Hospital's Patient Records Management System 1.0 is vulnerable to Insecure Permissions via the id parameter in manage_user endpoint. Simply change the value and data of other users can be displayed. +</code> + +- [vlakhani28/CVE-2022-22296](https://github.com/vlakhani28/CVE-2022-22296) + ### CVE-2022-22536 (2022-02-09) <code>SAP NetWeaver Application Server ABAP, SAP NetWeaver Application Server Java, ABAP Platform, SAP Content Server 7.53 and SAP Web Dispatcher are vulnerable for request smuggling and request concatenation. An unauthenticated attacker can prepend a victim's request with arbitrary data. This way, the attacker can execute functions impersonating the victim or poison intermediary Web caches. A successful attack could result in complete compromise of Confidentiality, Integrity and Availability of the system.\n\n @@ -8305,6 +8338,7 @@ </code> - [HynekPetrak/log4shell-finder](https://github.com/HynekPetrak/log4shell-finder) +- [AlphabugX/CVE-2022-RCE](https://github.com/AlphabugX/CVE-2022-RCE) - [tkomlodi/CVE-2022-23305_POC](https://github.com/tkomlodi/CVE-2022-23305_POC) ### CVE-2022-23342 (2022-06-21) @@ -18508,6 +18542,7 @@ - [Occamsec/log4j-checker](https://github.com/Occamsec/log4j-checker) - [snatalius/log4j2-CVE-2021-44228-poc-local](https://github.com/snatalius/log4j2-CVE-2021-44228-poc-local) - [Contrast-Security-OSS/CVE-2021-44228](https://github.com/Contrast-Security-OSS/CVE-2021-44228) +- [alexbakker/log4shell-tools](https://github.com/alexbakker/log4shell-tools) - [perryflynn/find-log4j](https://github.com/perryflynn/find-log4j) - [5l1v3r1/jndiRep](https://github.com/5l1v3r1/jndiRep) - [alpacamybags118/log4j-cve-2021-44228-sample](https://github.com/alpacamybags118/log4j-cve-2021-44228-sample)